source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/ALF%20%28proof%20assistant%29
|
ALF ("Another logical framework") is a structure editor for monomorphic Martin-Löf type theory developed at Chalmers University. It is a predecessor of the Alfa, Agda, Cayenne and Coq proof assistants and dependently typed programming languages. It was the first language to support inductive families and dependent pattern matching.
|
https://en.wikipedia.org/wiki/Acarodomatia
|
Acarodomatia (singular Acarodomatium) (Latin: Acari - mites, domus - dwelling), are tussocks of hairs or nonglandular trichomes located in pits situated in major leaf vein axes of many plant species, occupied and caused by predatory and mycophagous mites.
Acarodomatia have also been described from lizards where they are commonly called "mite pockets". These cavities or skin folds are usually located around the neck or behind the legs and occupied by chiggers. Their function is debated, but they are thought to distract mites from damaging or blocking important skin surfaces such as the tympans.
See also
Domatium
|
https://en.wikipedia.org/wiki/ArcObjects
|
ArcObjects is a development environment of the ArcGIS family of applications. Using Visual Basic for Applications, C# or Java SDK for ArcGIS, it allows developers to extend these applications.ArcObjects is a library of Component Object Model (COM) components that build up the foundation of Esri's ArcGIS platform. ArcObjects is written primarily in the C++ programming language. Since ArcGIS is completely built on top of ArcObjects, the ArcGIS platform can be fully customized and extended by making use of its COM services and capabilities. This allows for easy extension of the ArcObjects data model with any programming language that is compatible with COM, such as Visual Basic, C#, Visual Basic.NET, Java and Python. COM enables components to be reused at a binary level, meaning developers do not require access to the source code of ArcObjects in order to extend the ArcGIS platform. For this reason, an ArcObjects programmer can make use of any type inside the ArcObjects system without knowing the implementation details of the type, only needing to know what the type is able to do.
The ArcObjects data model is based on the COM standard, which makes it compatible with other COM objects and applications. This allows for easy integration and collaboration with other systems that are also based on the COM standard. The ArcGIS platform was built using ArcObjects types, such as classes, interfaces, and enumerations. ArcObjects use COM interfaces to organize and communicate properties and methods of its classes, ensuring compatibility with other COM-based objects and systems. When working with an ArcObjects COM class, its properties and methods are accessed solely through one of its implemented interfaces via the process of Query Interface (QI). Multiple interfaces are commonly available for classes in ArcObjects. For example, it is possible to query for additional interfaces implemented by an object after instantiation via the process of QI. Although only one interface can
|
https://en.wikipedia.org/wiki/Word%20addressing
|
In computer architecture, word addressing means that addresses of memory on a computer uniquely identify words of memory. It is usually used in contrast with byte addressing, where addresses uniquely identify bytes. Almost all modern computer architectures use byte addressing, and word addressing is largely only of historical interest. A computer that uses word addressing is sometimes called a word machine.
Basics
Consider a computer which provides 524,288 (219) bits of memory. If that memory is arranged in a byte-addressable flat address space using 8-bit bytes, then there are 65,536 (216) valid addresses, from 0 to 65,535, each denoting an independent 8 bits of memory. If instead it is arranged in a word-addressable flat address space using 32-bit words, then there are 16,384 (214) valid addresses, from 0 to 16,383, each denoting an independent 32 bits.
More generally, the minimum addressable unit (MAU) is a property of a specific memory abstraction. Different abstractions within a computer may use different MAUs, even when they are representing the same underlying memory. For example, a computer might use 32-bit addresses with byte addressing in its instruction set, but the CPU's cache coherence system might work with memory only at a granularity of 64-byte cache lines, allowing any particular cache line to be identified with only a 26-bit address and decreasing the overhead of the cache.
The address translation done by virtual memory often affects the structure and width of the address space, but it does not change the MAU.
Trade-offs of different minimum addressable units
The size of the minimum addressable unit of memory can have complex trade-offs. Using a larger MAU allows the same amount of memory to be covered with a smaller address, which can substantially decrease the memory requirements of a program. However, using a smaller MAU makes it easier to work efficiently with small items of data.
Suppose a program wishes to store one of the 12
|
https://en.wikipedia.org/wiki/Bongkrek%20acid
|
Bongkrek acid (also known as bongkrekic acid) is a respiratory toxin produced in fermented coconut or corn contaminated by the bacterium Burkholderia gladioli pathovar cocovenenans. It is a highly toxic, heat-stable, colorless, odorless, and highly unsaturated tricarboxylic acid that inhibits the ADP/ATP translocase, also called the mitochondrial ADP/ATP carrier, preventing ATP from leaving the mitochondria to provide metabolic energy to the rest of the cell. Bongkrek acid, when consumed through contaminated foods, mainly targets the liver, brain, and kidneys along with symptoms that include vomiting, diarrhea, urinary retention, abdominal pain, and excessive sweating. Most of the outbreaks are found in Indonesia and China where fermented coconut and corn-based foods are consumed. In October 2020, nine members of a family in China died after eating corn noodles contaminated with Bongkrek acid.
Discovery and history
In 1895, there was a food-poisoning outbreak in Java, Indonesia. The outbreak was caused by the consumption of Indonesian traditional food called tempe Bongkrek. During this time, tempe Bongkrek served as a main source of protein in Java due to its inexpensiveness. Tempe Bongkrek is made by extracting the coconut meat by-product from coconut milk into a form of cake, which is then fermented with R. oligosporus mold. The first outbreak of the Bongkrek poisoning by tempe Bongkrek was recorded by Dutch researchers; however no further research to find the cause of the poisoning was conducted in 1895. During 1930s, Indonesian government went through an economic depression, and this condition caused some of the people to make tempe Bongkrek by themselves, instead of buying it directly from well-trained producers. As a result, the poisonings occurred frequently, reaching 10 to 12 a year. Dutch scientists, named W.K Mertens and A.G. van Veen from the Eijkman Institute of Jakarta, started to find the cause of the poisoning in the early 1930s. They successfully i
|
https://en.wikipedia.org/wiki/Siliceous%20ooze
|
Siliceous ooze is a type of biogenic pelagic sediment located on the deep ocean floor. Siliceous oozes are the least common of the deep sea sediments, and make up approximately 15% of the ocean floor. Oozes are defined as sediments which contain at least 30% skeletal remains of pelagic microorganisms. Siliceous oozes are largely composed of the silica based skeletons of microscopic marine organisms such as diatoms and radiolarians. Other components of siliceous oozes near continental margins may include terrestrially derived silica particles and sponge spicules. Siliceous oozes are composed of skeletons made from opal silica SiO2·nH2O, as opposed to calcareous oozes, which are made from skeletons of calcium carbonate (CaCO3·nH2O) organisms (i.e. coccolithophores). Silica (Si) is a bioessential element and is efficiently recycled in the marine environment through the silica cycle. Distance from land masses, water depth and ocean fertility are all factors that affect the opal silica content in seawater and the presence of siliceous oozes.
Formation
Biological uptake of marine silica
Siliceous marine organisms, such as diatoms and radiolarians, use silica to form skeletons through a process known as biomineralization. Diatoms and radiolarians have evolved to uptake silica in the form of silicic acid, Si(OH)4. Once an organism has sequestered Si(OH)4 molecules in its cytoplasm, the molecules are transported to silica deposition vesicles where they are transformed into opal silica (B-SiO2). Diatoms and radiolarians have specialized proteins called silicon transporters that prevent mineralization during the sequestration and transportation of silicic acid within the organism.
The chemical formula for biological uptake of silicic acid is:
H4SiO4(aq) <-> SiO2*nH2O(s) + (2-n)H2O(l)
Opal silica saturation state
The opal silica saturation state increases with depth in the ocean due to dissolution of sinking opal particles produced in surface ocean waters, but still rem
|
https://en.wikipedia.org/wiki/Edwards%20Lifesciences
|
Edwards Lifesciences is an American medical technology company headquartered in Irvine, California, specializing in artificial heart valves and hemodynamic monitoring. It developed the SAPIEN transcatheter aortic heart valve made of cow tissue within a balloon-expandable, cobalt-chromium frame, deployed via catheter. The company has manufacturing facilities at the Irvine headquarters, as well as in Draper, Utah; Costa Rica; the Dominican Republic; Puerto Rico; and Singapore; and is building a new facility due to be completed in 2021 in Limerick, Ireland.
History
Edwards was originally founded by engineer Miles “Lowell” Edwards in 1958. Edwards and Dr. Albert Starr, a surgeon at the University of Oregon Medical School, designed, developed, tested and successfully placed in a patient the first Starr-Edwards mitral valve in 1960. As a result of the successful heart surgery, Edwards Laboratories was founded in Santa Ana, California that same year.
Edwards was acquired by Baxter in 1985. It was spun off from Baxter in 2000.
On January 25, 2017, Edwards completed the acquisition of Valtech Cardio for $340 million. The deal had been first announced the previous November.
On December 6, 2017, Edwards acquired Harpoon Medical of Baltimore, Maryland for $100 million. Harpoon, founded in 2013, developed a minimally invasive heart surgery product for mitral valve repair to treat degenerative mitral regurgitation. At the time of the acquisition, the product was not available on any market.
On April 18, 2019, Edwards completed the acquisition of CAS Medical Systems of Branford, Connecticut for ~$100 million.
Edwards SAPIEN 3 and SAPIEN 3 Ultra Transcatheter Heart Valve systems were FDA-approved for the treatment of patients at low risk for death or major complications associated with open-heart surgery on August 16, 2019. These products are used to treat patients with severe aortic stenosis without utilizing open-heart surgery.
On September 29, 2020, Edwards co-sponsored t
|
https://en.wikipedia.org/wiki/Logical%20block%20addressing
|
Logical block addressing (LBA) is a common scheme used for specifying the location of blocks of data stored on computer storage devices, generally secondary storage systems such as hard disk drives. LBA is a particularly simple linear addressing scheme; blocks are located by an integer index, with the first block being LBA 0, the second LBA 1, and so on.
The IDE standard included 22-bit LBA as an option, which was further extended to 28-bit with the release of ATA-1 (1994) and to 48-bit with the release of ATA-6 (2003), whereas the size of entries in on-disk and in-memory data structures holding the address is typically 32 or 64 bits. Most hard disk drives released after 1996 implement logical block addressing.
Overview
In logical block addressing, only one number is used to address data, and each linear base address describes a single block.
The LBA scheme replaces earlier schemes which exposed the physical details of the storage device to the software of the operating system. Chief among these was the cylinder-head-sector (CHS) scheme, where blocks were addressed by means of a tuple which defined the cylinder, head, and sector at which they appeared on the hard disk. CHS did not map well to devices other than hard disks (such as tapes and networked storage), and was generally not used for them. CHS was used in early MFM and RLL drives, and both it and its successor, extended cylinder-head-sector (ECHS), were used in the first ATA drives. However, current disk drives use zone bit recording, where the number of sectors per track depends on the track number. Even though the disk drive will report some CHS values as sectors per track (SPT) and heads per cylinder (HPC), they have little to do with the disk drive's true geometry.
LBA was first introduced in SCSI as an abstraction. While the drive controller still addresses data blocks by their CHS address, this information is generally not used by the SCSI device driver, the OS, filesystem code, or any applic
|
https://en.wikipedia.org/wiki/SECS/GEM
|
The SECS/GEM is the semiconductor's equipment interface protocol for equipment-to-host data communications. In an automated fab, the interface can start and stop equipment processing, collect measurement data, change variables and select recipes for products. The SECS (SEMI Equipment Communications Standard)/GEM (Generic Equipment Model) standards do all this in a defined way.
Developed by the SEMI (Semiconductor Equipment and Materials International) organization, the standards define a common set of equipment behaviour and communications capabilities.
The Generic Model for Communications and Control Of Manufacturing Equipment (GEM) standard is maintained and published by the non-profit organization Semiconductor Equipment and Materials International (SEMI). Generally speaking, the SECS/GEM standard defines messages, state machines and scenarios to enable factory software to control and monitor manufacturing equipment.
The GEM standard is formally designated and referred to as SEMI standard E30, but frequently simply referred to as the GEM or SECS/GEM standard. GEM intends "to produce economic benefits for both device manufacturers and equipment suppliers..." by defining "... a common set of equipment behavior and communications capabilities that provide the functionality and flexibility to support the manufacturing automation programs of semiconductor device manufacturers" [SEMI E30, 1.3]. GEM is a standard implementation of the SECS-II standard, SEMI standard E5. Many equipment in semiconductor (front end and back end), surface mount technology, electronics assembly, photovoltaic, flat panel display and other manufacturing industries worldwide provide a SECS/GEM interface on the manufacturing equipment so that the factory host software can communicate with the machine for monitoring and/or controlling purposes. Because the GEM standard was written with very few semiconductor-specific features, it can be applied to virtually any automated manufacturing equipme
|
https://en.wikipedia.org/wiki/YbaK%20protein%20domain
|
In molecular biology, this protein domain of unknown function is found in numerous prokaryote organisms. This domain also occurs in a number of prolyl-tRNA synthetases (proRS) from prokaryotes. Thus, the domain is thought to be involved in oligonucleotide binding, with possible roles in recognition/discrimination or editing of prolyl-tRNA.
Function
Studies have shown that YbaK functions as a Cys-tRNAPro deacylase in vivo, deacetylation additionally involves turning genes off, hence, it can be assumed that it is preventing the addition of an amino acid to a tRNA molecule, thus preventing translation. In vitro studies with the full set of 20 E. coli aminoacyl-tRNAs revealed that the Haemophilus influenzae and E. coli YbaK proteins are moderately general aminoacyl-tRNA deacylases that preferentially hydrolyze Cys-tRNAPro and Cys-tRNACy. Furthermore, YbaK-mediated hydrolysis of aminoacyl-tRNA has been indicated to influence cell growth. It has been further indicated that YbaK domain is important in the editing function if the wrong amino acid has been joined to the wrong tRNA.
Structure
The structure of YbaK shows a novel fold. This domain also occurs in a number of prolyl-tRNA synthetases (proRS) from prokaryotes. Thus, the domain is thought to be involved in oligonucleotide binding, with possible roles in recognition/discrimination or editing of prolyl-tRNA. YbaK is a highly curved mixed seven-stranded beta-sheet surrounded by six short alpha helices
|
https://en.wikipedia.org/wiki/IFIP%20Working%20Group%202.3
|
IFIP Working Group 2.3 on Programming Methodology is a working group of the International Federation for Information Processing (IFIP). Its main aim is to increase programmers’ ability to compose programs. To this end, WG2.3 provides an international forum for discussion and cross-fertilization of ideas between researchers in programming methodology and neighboring fields. Generally, members report on work in progress and expect suggestions and advice. Discussions are often broadened by inviting "observers" to meetings as full participants, some of whom eventually become members.
Scope
This scope of work in WG2.3 was introduced by Edsger W. Dijkstra in meeting 0 (Oslo, Norway, July 1969).
Identification of sources of difficulties encountered in present-day programming;
The interdependence between the formulation of problems and the formulation of programs, and the mapping of relations existing in the world of problems into the relations among programs and their components;
Intellectual disciplines and problem-solving techniques that can aid programmers in the composition of programs;
The problem of achieving program reliability;
The consequences of requirements for program adaptability;
The problem of provability of program correctness and its influence on the structure of programs and on the process of their composition;
Guidelines of partitioning large programming tasks and defining the interfaces between the parts;
Software for mechanized assistance to program composition.
History
In December 1968, IFIP Working Group 2.1 adopted the proposal by Aad van Wijngaarden as a successor to Algol 60 (ultimately leading to ALGOL 68). A group of members of WG2.1 opposed it and produced a minority report. The group also felt that rather than just programming languages, a forum was needed to discuss the general problem of programming. Another impetus for the creation of a group was the findings of the first of the NATO Software Engineering Conferences, held in 1968, wh
|
https://en.wikipedia.org/wiki/Articulavirales
|
Articulavirales is an order of segmented negative-strand RNA viruses which infect invertebrates and vertebrates. It includes the family of influenza viruses which infect humans. It is the only order of viruses in the monotypic class Insthoviricetes. The order contains two families and eight genera.
Etymology
The order name Articulavirales derives from Latin meaning "segmented" (alluding to the segmented genome of member viruses) added to the suffix for virus orders -virales. The class name Insthoviricetes is a portmanteau of member viruses "influenza, isavirus, and thogotovirus" added to the suffix -viricetes for virus classes.
Genome
Member viruses have segmented, negative-sense, single-stranded RNA genomes.
Classification
The order Articulavirales contains two families and eight genera:
Amnoonviridae
Tilapinevirus
Orthomyxoviridae
Alphainfluenzavirus
Betainfluenzavirus
Deltainfluenzavirus
Gammainfluenzavirus
Isavirus
Quaranjavirus
Thogotovirus
|
https://en.wikipedia.org/wiki/Hilbert%20symbol
|
In mathematics, the Hilbert symbol or norm-residue symbol is a function (–, –) from K× × K× to the group of nth roots of unity in a local field K such as the fields of reals or p-adic numbers. It is related to reciprocity laws, and can be defined in terms of the Artin symbol of local class field theory. The Hilbert symbol was introduced by in his Zahlbericht, with the slight difference that he defined it for elements of global fields rather than for the larger local fields.
The Hilbert symbol has been generalized to higher local fields.
Quadratic Hilbert symbol
Over a local field K whose multiplicative group of non-zero elements is K×,
the quadratic Hilbert symbol is the function (–, –) from K× × K× to {−1,1} defined by
Equivalently, if and only if is equal to the norm of an element of the quadratic extension page 110.
Properties
The following three properties follow directly from the definition, by choosing suitable solutions of the diophantine equation above:
If a is a square, then (a, b) = 1 for all b.
For all a,b in K×, (a, b) = (b, a).
For any a in K× such that a−1 is also in K×, we have (a, 1−a) = 1.
The (bi)multiplicativity, i.e.,
(a, b1b2) = (a, b1)·(a, b2)
for any a, b1 and b2 in K× is, however, more difficult to prove, and requires the development of local class field theory.
The third property shows that the Hilbert symbol is an example of a Steinberg symbol and thus factors over the second Milnor K-group , which is by definition
K× ⊗ K× / (a ⊗ (1−a), a ∈ K× \ {1})
By the first property it even factors over . This is the first step towards the Milnor conjecture.
Interpretation as an algebra
The Hilbert symbol can also be used to denote the central simple algebra over K with basis 1,i,j,k and multiplication rules , , . In this case the algebra represents an element of order 2 in the Brauer group of K, which is identified with -1 if it is a division algebra and +1 if it is isomorphic to the algebra of 2 by 2 matrices.
Hilbert symbols over the
|
https://en.wikipedia.org/wiki/Digital%20credential
|
Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a driver's license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket or a public transport ticket, a digital credential is a proof of qualification, competence, or clearance that is attached to a person. Also, digital credentials prove something about their owner. Both types of credentials may contain personal information such as the person's name, birthplace, birthdate, and/or biometric information such as a picture or a finger print.
Because of the still evolving, and sometimes conflicting, terminologies used in the fields of computer science, computer security, and cryptography, the term "digital credential" is used quite confusingly in these fields. Sometimes passwords or other means of authentication are referred to as credentials. In operating system design, credentials are the properties of a process (such as its effective UID) that is used for determining its access rights. On other occasions, certificates and associated key material such as those stored in PKCS#12 and PKCS#15 are referred to as credentials.
Digital badges are a form of digital credential that indicate an accomplishment, skill, quality or interest. Digital badges can be earned in a variety of learning environments.
Digital cash
Money, in general, is not regarded as a form of qualification that is inherently linked to a specific individual, as the value of token money is perceived to reside independently. However, the emergence of digital assets, such as digital cash, has introduced a new set of challenges due to their susceptibility to replication. Consequently, digital cash protocols have been developed with additional measures to mitigate the issue of double spending, wherein a coin is used for multiple transactions.
Credentials, on the other hand, serve as tangible evidence of an individual's qualifications or a
|
https://en.wikipedia.org/wiki/USC%20Jane%20Goodall%20Research%20Center
|
The USC Jane Goodall Research Center is a part of the department of Anthropology at the University of Southern California. It is co-directed by professors of anthropology Craig Stanford, Chris Boehm, Nayuta Yamashita, and Roberto Delgado.
The center was established in 1991 with the joint appointment of Jane Goodall as Distinguished Emeritus Professor in Anthropology and Occupational Science. The Center offers USC students the chance to study in Gombe.
See also
USC Center for Visual Anthropology
|
https://en.wikipedia.org/wiki/Lateral%20flow%20test
|
A lateral flow test (LFT), is an assay also known as a lateral flow device (LFD), lateral flow immunochromatographic assay, or rapid test. It is a simple device intended to detect the presence of a target substance in a liquid sample without the need for specialized and costly equipment. LFTs are widely used in medical diagnostics in the home, at the point of care, and in the laboratory. For instance, the home pregnancy test is an LFT that detects a specific hormone. These tests are simple and economical and generally show results in around five to thirty minutes. Many lab-based applications increase the sensitivity of simple LFTs by employing additional dedicated equipment. Because the target substance is often a biological antigen, many lateral flow tests are rapid antigen tests (RAT or ART).
LFTs operate on the same principles of affinity chromatography as the enzyme-linked immunosorbent assays (ELISA). In essence, these tests run the liquid sample along the surface of a pad with reactive molecules that show a visual positive or negative result. The pads are based on a series of capillary beds, such as pieces of porous paper, microstructured polymer, or sintered polymer. Each of these pads has the capacity to transport fluid (e.g., urine, blood, saliva) spontaneously.
The sample pad acts as a sponge and holds an excess of sample fluid. Once soaked, the fluid flows to the second conjugate pad in which the manufacturer has stored freeze dried bio-active particles called conjugates (see below) in a salt–sugar matrix. The conjugate pad contains all the reagents required for an optimized chemical reaction between the target molecule (e.g., an antigen) and its chemical partner (e.g., antibody) that has been immobilized on the particle's surface. This marks target particles as they pass through the pad and continue across to the test and control lines. The test line shows a signal, often a color as in pregnancy tests. The control line contains affinity ligands whic
|
https://en.wikipedia.org/wiki/Tarski%20Lectures
|
The Alfred Tarski Lectures are an annual distinction in mathematical logic and series of lectures held at the University of California, Berkeley. Established in tribute to Alfred Tarski on the fifth anniversary of his death, the award has been given every year since 1989. Following a 2-year hiatus after the 2020 lecture was not given due to the COVID-19 pandemic, the lectures resumed in 2023.
Tarski Lecturers
The list of past Tarski lecturers is maintained by UC Berkeley.
See also
Center for New Media Lectures
Howison Lectures
Gödel Lecture
List of mathematics awards
List of philosophy awards
List of logicians
External links
Site of the Alfred Tarski Lectures at UC Berkeley Mathematics
Site of the Alfred Tarski Lectures at UC Berkeley Logic
List of past Alfred Tarski Lectures
|
https://en.wikipedia.org/wiki/Food%20engineering
|
Food engineering is a scientific, academic, and professional field that interprets and applies principles of engineering, science, and mathematics to food manufacturing and operations, including the processing, production, handling, storage, conservation, control, packaging and distribution of food products. Given its reliance on food science and broader engineering disciplines such as electrical, mechanical, civil, chemical, industrial and agricultural engineering, food engineering is considered a multidisciplinary and narrow field.
Due to the complex nature of food materials, food engineering also combines the study of more specific chemical and physical concepts such as biochemistry, microbiology, food chemistry, thermodynamics, transport phenomena, rheology, and heat transfer. Food engineers apply this knowledge to the cost-effective design, production, and commercialization of sustainable, safe, nutritious, healthy, appealing, affordable and high-quality ingredients and foods, as well as to the development of food systems, machinery, and instrumentation.
History
Although food engineering is a relatively recent and evolving field of study, it is based on long-established concepts and activities. The traditional focus of food engineering was preservation, which involved stabilizing and sterilizing foods, preventing spoilage, and preserving nutrients in food for prolonged periods of time. More specific traditional activities include food dehydration and concentration, protective packaging, canning and freeze-drying . The development of food technologies were greatly influenced and urged by wars and long voyages, including space missions, where long-lasting and nutritious foods were essential for survival. Other ancient activities include milling, storage, and fermentation processes. Although several traditional activities remain of concern and form the basis of today’s technologies and innovations, the focus of food engineering has recently shifted to food qua
|
https://en.wikipedia.org/wiki/Moving-boundary%20electrophoresis
|
Moving-boundary electrophoresis (MBE also free-boundary electrophoresis) is a technique for separation of chemical compounds by electrophoresis in a free solution.
History
Moving-boundary electrophoresis was developed by Arne Tiselius in 1930. Tiselius was awarded the 1948 Nobel Prize in chemistry for his work on the separation of colloids through electrophoresis, the motion of charged particles through a stationary liquid under the influence of an electric field.
Apparatus
The moving-boundary electrophoresis apparatus includes a U-shaped cell filled with buffer solution and electrodes immersed at its ends. The sample applied could be any mixture of charged components such as a protein mixture. On applying voltage, the compounds will migrate to the anode or cathode depending on their charges. The change in the refractive index at the boundary of the separated compounds is detected using Schlieren optics at both ends of the solution in the cell.
See also
Capillary electrophoresis
|
https://en.wikipedia.org/wiki/Selenium%20%28software%29
|
Selenium is an open source umbrella project for a range of tools and libraries aimed at supporting browser automation. It provides a playback tool for authoring functional tests across most modern web browsers, without the need to learn a test scripting language (Selenium IDE). It also provides a test domain-specific language (Selenese) to write tests in a number of popular programming languages, including JavaScript (Node.js), C#, Groovy, Java, Perl, PHP, Python, Ruby and Scala. Selenium runs on Windows, Linux, and macOS. It is open-source software released under the Apache License 2.0.
History
Selenium was originally developed by Jason Huggins in 2004 as an internal tool at ThoughtWorks. Huggins was later joined by other programmers and testers at ThoughtWorks, before Paul Hammant joined the team and steered the development of the second mode of operation that would later become "Selenium Remote Control" (RC). The tool was open sourced that year.
In 2005 Dan Fabulich and Nelson Sproul (with help from Pat Lightbody) made an offer to accept a series of patches that would transform Selenium-RC into what it became best known for. In the same meeting, the steering of Selenium as a project would continue as a committee, with Huggins and Hammant being the ThoughtWorks representatives.
In 2007, Huggins joined Google. Together with others like Jennifer Bevan, he continued with the development and stabilization of Selenium RC. At the same time, Simon Stewart at ThoughtWorks developed a superior browser automation tool called WebDriver. In 2009, after a meeting between the developers at the Google Test Automation Conference, it was decided to merge the two projects, and call the new project Selenium WebDriver, or Selenium 2.0.
In 2008, Philippe Hanrigou (then at ThoughtWorks) made "Selenium Grid", which provides a hub allowing the running of multiple Selenium tests concurrently on any number of local or remote systems, thus minimizing test execution time. Grid offered,
|
https://en.wikipedia.org/wiki/Karun%20Thapa
|
Karun Thapa (Nepali: करुण थापा) born on 23 March 1965) is a Nepali IT expert, film editor, 3D animator, trainer, a well-known lyricist and Ghazal writer. Karun is known for his technological contribution to Nepali IT and media industry. He has contributed by introducing Devanagari fonts in computers, introducing AVID Digital Film Editing system in Nepal and introducing 3D animation in Nepal.
Early life and education
Karun Thapa was born in 1965 (BS 2022) in Beni to a Hindu family. Karun studied till class 3 in his village school called Dhaulagiri School. He stood first in Myagdi district in a scholarship exam, got scholarship and went to Budhanilkantha School in Kathmandu. After completing high school from Budhanilkantha School, Karun went to Amrit Science College (ASCOL) to complete his intermediate in science and graduation in Computer Science from Priyadarshini College.
Career
Karun Thapa started his career a software developer and a computer trainer. He started making business software for hotels, banks, business companies, etc. and started a computer training institute in 1988.
Thapa was the first person to develop Nepali (Devanagari) font on Apple IIe and Apple Macintosh computers. UNESCO nominated Thapa to participate in the Asian Federation of Natural Language Processing (AIT, Bangkok) 1992 and the Asia Pacific Regional Seminar on Information Technology and Newspaper Publishing in Madras (from 11–14 April 1995) in recognition to the font development done by him. He also developed Limbu (Srijunga) Script and Rai (Wambule Script) in 1994. He is mentioned in the history section in a book called History, Culture and Customs of Sikkim (J. R. Subba). Thapa introduced 3D animation in Nepal and he is the first 3D animator in Nepal.
Karun Introduced AVID film editing and digital cinema in Nepal.
Filmography
Awards
Winner
Achievements
Honours
Served as Jury Member
Jury Member for the following
|
https://en.wikipedia.org/wiki/Topological%20degree%20theory
|
In mathematics, topological degree theory is a generalization of the winding number of a curve in the complex plane. It can be used to estimate the number of solutions of an equation, and is closely connected to fixed-point theory. When one solution of an equation is easily found, degree theory can often be used to prove existence of a second, nontrivial, solution. There are different types of degree for different types of maps: e.g. for maps between Banach spaces there is the Brouwer degree in Rn, the Leray-Schauder degree for compact mappings in normed spaces, the coincidence degree and various other types. There is also a degree for continuous maps between manifolds.
Topological degree theory has applications in complementarity problems, differential equations, differential inclusions and dynamical systems.
Further reading
Topological fixed point theory of multivalued mappings, Lech Górniewicz, Springer, 1999,
Topological degree theory and applications, Donal O'Regan, Yeol Je Cho, Yu Qing Chen, CRC Press, 2006,
Mapping Degree Theory, Enrique Outerelo, Jesus M. Ruiz, AMS Bookstore, 2009,
Topology
Algebraic topology
Differential topology
|
https://en.wikipedia.org/wiki/Basal%20vein
|
The basal vein is a vein in the brain. It is formed at the anterior perforated substance by the union of
(a) a small anterior cerebral vein which accompanies the anterior cerebral artery and supplies the medial surface of the frontal lobe by the fronto-basal vein.
(b) the deep middle cerebral vein (deep Sylvian vein), which receives tributaries from the insula and neighboring gyri, and runs in the lower part of the lateral cerebral fissure, and
(c) the inferior striate veins, which leave the corpus striatum through the anterior perforated substance.
The basal vein passes backward around the cerebral peduncle, and ends in the great cerebral vein; it receives tributaries from the interpeduncular fossa, the inferior horn of the lateral ventricle, the hippocampal gyrus, and the mid-brain.
|
https://en.wikipedia.org/wiki/Vestibulocochlear%20nerve
|
The vestibulocochlear nerve or auditory vestibular nerve, also known as the eighth cranial nerve, cranial nerve VIII, or simply CN VIII, is a cranial nerve that transmits sound and equilibrium (balance) information from the inner ear to the brain. Through olivocochlear fibers, it also transmits motor and modulatory information from the superior olivary complex in the brainstem to the cochlea.
Structure
The vestibulocochlear nerve consists mostly of bipolar neurons and splits into two large divisions: the cochlear nerve and the vestibular nerve.
Cranial nerve 8, the vestibulocochlear nerve, goes to the middle portion of the brainstem called the pons (which then is largely composed of fibers going to the cerebellum).
The 8th cranial nerve runs between the base of the pons and medulla oblongata (the lower portion of the brainstem). This junction between the pons, medulla, and cerebellum that contains the 8th nerve is called the cerebellopontine angle.
The vestibulocochlear nerve is accompanied by the labyrinthine artery, which usually branches off from the anterior inferior cerebellar artery at the cerebellopontine angle, and then goes with the 7th nerve through the internal acoustic meatus to the internal ear.
The cochlear nerve travels away from the cochlea of the inner ear where it starts as the spiral ganglia. Processes from the organ of Corti conduct afferent transmission to the spiral ganglia. It is the inner hair cells of the organ of Corti that are responsible for activation of afferent receptors in response to pressure waves reaching the basilar membrane through the transduction of sound. The exact mechanism by which sound is transmitted by the neurons of the cochlear nerve is uncertain; the two competing theories are place theory and temporal theory.
The vestibular nerve travels from the vestibular system of the inner ear. The vestibular ganglion houses the cell bodies of the bipolar neurons and extends processes to five sensory organs. Three of these a
|
https://en.wikipedia.org/wiki/Disjunct%20distribution
|
In biology, a taxon with a disjunct distribution is one that has two or more groups that are related but considerably separated from each other geographically. The causes are varied and might demonstrate either the expansion or contraction of a species' range.
Range fragmentation
Also called range fragmentation, disjunct distributions may be caused by changes in the environment, such as mountain building and continental drift or rising sea levels; it may also be due to an organism expanding its range into new areas, by such means as rafting, or other animals transporting an organism to a new location (plant seeds consumed by birds and animals can be moved to new locations during bird or animal migrations, and those seeds can be deposited in new locations in fecal matter). Other conditions that can produce disjunct distributions include: flooding, or changes in wind, stream, and current flows, plus others such as anthropogenic introduction of alien introduced species either accidentally or deliberately (agriculture and horticulture).
Habitat fragmentation
Disjunct distributions can occur when suitable habitat is fragmented, which produces fragmented populations, and when that fragmentation becomes so divergent that species movement between one suitable habitat to the next is disrupted, isolated population can be produced. Extinctions can cause disjunct distribution, especially in areas where only scattered areas are habitable by a species; for instance, island chains or specific elevations along a mountain range or areas along a coast or between bodies of water like streams, lakes and ponds.
Examples
There are many patterns of disjunct distributions at many scales: Irano-Turanian disjunction, Europe - East Asia, Europe-South Africa (e.g. genus Erica), Mediterranean-Hoggart disjunction (genus Olea), etc.
Lusitanian distribution
This kind of disjunct distribution of a species, such that it occurs in Iberia and in Ireland, without any intermediate localities, is us
|
https://en.wikipedia.org/wiki/Presenilin-1
|
Presenilin-1 (PS-1) is a presenilin protein that in humans is encoded by the PSEN1 gene. Presenilin-1 is one of the four core proteins in the gamma secretase complex, which is considered to play an important role in generation of amyloid beta (Aβ) from amyloid-beta precursor protein (APP). Accumulation of amyloid beta is associated with the onset of Alzheimer's disease.
Structure
Presenilin possesses a 9 transmembrane domain topology, with an extracellular C-terminus and a cytosolic N-terminus. Presenilin undergoes endo-proteolytic processing to produce ~27-28 kDa N-terminal and ~16-17 kDa C-terminal fragments in humans. Furthermore, presenilin exists in the cell mainly as a heterodimer of the C-terminal and N-terminus fragments. When presenilin 1 is overexpressed, the full length protein accumulates in an inactive form. Based on evidence that a gamma-secretase inhibitor binds to the fragments, the cleaved presenilin complex is considered to be the active form.
Function
Presenilins are postulated to regulate APP processing through their effects on gamma secretase, an enzyme that cleaves APP. Also, it is thought that the presenilins are involved in the cleavage of the Notch receptor, such that they either directly regulate gamma secretase activity or themselves are protease enzymes. Multiple alternatively spliced transcript variants have been identified for this gene, the full-length natures of only some have been determined.
Notch signaling pathway
In Notch signaling, critical proteolytic reactions takes place during maturation and activation of Notch membrane receptor. Notch1 is cleaved extracellularlly at site1 (S1) and two polypeptides are produced to form a heterodimer receptor on the cell surface. After the formation of receptor, Notch1 is further cleaved in site 3(S3) and release Notch1 intracellular domain (NICD) from the membrane.
Presenilin 1 has been shown to play an important role in proteolytic process. In the prenilin 1 null mutant drosophila,
|
https://en.wikipedia.org/wiki/Live%2C%20virtual%2C%20and%20constructive
|
Live, Virtual, & Constructive (LVC) Simulation is a broadly used taxonomy for classifying Modeling and Simulation (M&S). However, categorizing a simulation as a live, virtual, or constructive environment is problematic since there is no clear division among these categories. The degree of human participation in a simulation is infinitely variable, as is the degree of equipment realism. The categorization of simulations also lacks a category for simulated people working real equipment.
Categories
The LVC categories as defined by the United States Department of Defense in the Modeling and Simulation Glossary as follows:
Live - A simulation involving real people operating real systems. Military training events using real equipment are live simulations. They are considered simulations because they are not conducted against a live enemy.
Virtual - A simulation involving real people operating simulated systems. Virtual simulations inject a Human-in-the-Loop into a central role by exercising motor control skills (e.g., flying jet or tank simulator), decision making skills (e.g., committing fire control resources to action), or communication skills (e.g., as members of a team).
Constructive - A simulation involving simulated people operating simulated systems. Real people stimulate (make inputs to) such simulations, but are not involved in determining the outcomes. A constructive simulation is a computer program. For example, a military user may input data instructing a unit to move and to engage an enemy target. The constructive simulation determines the speed of movement, the effect of the engagement with the enemy and any battle damage that may occur. These terms should not be confused with specific constructive models such as Computer Generated Forces (CGF), a generic term used to refer to computer representations of forces in simulations that attempts to model human behavior. CGF is just one example model being used in a constructive environment. There are many
|
https://en.wikipedia.org/wiki/Ultra-high-purity%20steam%20for%20oxidation%20and%20annealing
|
Ultra-high-purity steam, also called the clean steam, UHP steam or high purity water vapor, is used in a variety of industrial manufacturing processes that require oxidation or annealing. These processes include the growth of oxide layers on silicon wafers for the semiconductor industry, originally described by the Deal-Grove model, and for the formation of passivation layers used to improve the light capture ability of crystalline photovoltaic cells. Several methods and technologies can be employed to generate ultra high purity steam, including pyrolysis, bubbling, direct liquid injection, and purified steam generation. The level of purity, or the relative lack of contamination, affects the quality of the oxide layer or annealed surface. The method of delivery affects growth rate, uniformity, and electrical performance. Oxidation and annealing are common steps in the manufacture of such devices as microelectronics and solar cells.
Characteristics
Steam is the gaseous state of water where the majority of the gas pressure is created by water molecules. This differs from humidified gas, where water vapor is a minor component of the gas mixture. Ideally, steam is composed only of H2O molecules. However, steam may also contain other molecules such as metals, urea, volatiles, chlorine, particles, microdroplets, and organics in reality. To be considered ultra high purity, steam must not have contaminants above a certain limit. Typical values for semiconductor are at part per billion (ppb) for any specific contaminant by volume. This is an arbitrary definition and is frequently set by the user.
Impurities in water are entrained into the steam as it is generated, and more may migrate into the steam from process piping materials as it is conducted to the process. These impurities or contaminants can be quite harmful when the steam is an ingredient in industrial manufacturing processes. As microelectronic device size and geometry shrink, the susceptibility to damage from
|
https://en.wikipedia.org/wiki/Nu%20function
|
In mathematics, the nu function is a generalization of the reciprocal gamma function of the Laplace transform.
Formally, it can be defined as
where is the Gamma function.
See also
Lambda function (disambiguation)
Mu function
|
https://en.wikipedia.org/wiki/Strain%20engineering
|
Strain engineering refers to a general strategy employed in semiconductor manufacturing to enhance device performance. Performance benefits are achieved by modulating strain, as one example, in the transistor channel, which enhances electron mobility (or hole mobility) and thereby conductivity through the channel. Another example are semiconductor photocatalysts strain-engineered for more effective use of sunlight.
In CMOS manufacturing
The use of various strain engineering techniques has been reported by many prominent microprocessor manufacturers, including AMD, IBM, and Intel, primarily with regards to sub-130 nm technologies. One key consideration in using strain engineering in CMOS technologies is that PMOS and NMOS respond differently to different types of strain. Specifically, PMOS performance is best served by applying compressive strain to the channel, whereas NMOS receives benefit from tensile strain. Many approaches to strain engineering induce strain locally, allowing both n-channel and p-channel strain to be modulated independently.
One prominent approach involves the use of a strain-inducing capping layer. CVD silicon nitride is a common choice for a strained capping layer, in that the magnitude and type of strain (e.g. tensile vs compressive) may be adjusted by modulating the deposition conditions, especially temperature. Standard lithography patterning techniques can be used to selectively deposit strain-inducing capping layers, to deposit a compressive film over only the PMOS, for example.
Capping layers are key to the Dual Stress Liner (DSL) approach reported by IBM-AMD. In the DSL process, standard patterning and lithography techniques are used to selectively deposit a tensile silicon nitride film over the NMOS and a compressive silicon nitride film over the PMOS.
A second prominent approach involves the use of a silicon-rich solid solution, especially silicon-germanium, to modulate channel strain. One manufacturing method involves epitaxial
|
https://en.wikipedia.org/wiki/%CE%A9-consistent%20theory
|
In mathematical logic, an ω-consistent (or omega-consistent, also called numerically segregative) theory is a theory (collection of sentences) that is not only (syntactically) consistent (that is, does not prove a contradiction), but also avoids proving certain infinite combinations of sentences that are intuitively contradictory. The name is due to Kurt Gödel, who introduced the concept in the course of proving the incompleteness theorem.
Definition
A theory T is said to interpret the language of arithmetic if there is a translation of formulas of arithmetic into the language of T so that T is able to prove the basic axioms of the natural numbers under this translation.
A T that interprets arithmetic is ω-inconsistent if, for some property P of natural numbers (defined by a formula in the language of T), T proves P(0), P(1), P(2), and so on (that is, for every standard natural number n, T proves that P(n) holds), but T also proves that there is some natural number n such that P(n) fails. This may not generate a contradiction within T because T may not be able to prove for any specific value of n that P(n) fails, only that there is such an n. In particular, such n is necessarily a nonstandard integer in any model for T (Quine has thus called such theories "numerically insegregative").
T is ω-consistent if it is not ω-inconsistent.
There is a weaker but closely related property of Σ1-soundness. A theory T is Σ1-sound (or 1-consistent, in another terminology) if every Σ01-sentence provable in T is true in the standard model of arithmetic N (i.e., the structure of the usual natural numbers with addition and multiplication).
If T is strong enough to formalize a reasonable model of computation, Σ1-soundness is equivalent to demanding that whenever T proves that a Turing machine C halts, then C actually halts. Every ω-consistent theory is Σ1-sound, but not vice versa.
More generally, we can define an analogous concept for higher levels of the arithmetical hierarchy
|
https://en.wikipedia.org/wiki/List%20of%20Tetris%20variants
|
This is a list of variants of the game Tetris. It includes officially licensed Tetris sequels, as well as unofficial clones.
Official games
Unofficial games
See also
List of puzzle video games
Notes
|
https://en.wikipedia.org/wiki/Riemann%20invariant
|
Riemann invariants are mathematical transformations made on a system of conservation equations to make them more easily solvable. Riemann invariants are constant along the characteristic curves of the partial differential equations where they obtain the name invariant. They were first obtained by Bernhard Riemann in his work on plane waves in gas dynamics.
Mathematical theory
Consider the set of conservation equations:
where and are the elements of the matrices and where and are elements of vectors. It will be asked if it is possible to rewrite this equation to
To do this curves will be introduced in the plane defined by the vector field . The term in the brackets will be rewritten in terms of a total derivative where are parametrized as
comparing the last two equations we find
which can be now written in characteristic form
where we must have the conditions
where can be eliminated to give the necessary condition
so for a nontrivial solution is the determinant
For Riemann invariants we are concerned with the case when the matrix is an identity matrix to form
notice this is homogeneous due to the vector being zero. In characteristic form the system is
with
Where is the left eigenvector of the matrix and is the characteristic speeds of the eigenvalues of the matrix which satisfy
To simplify these characteristic equations we can make the transformations such that
which form
An integrating factor can be multiplied in to help integrate this. So the system now has the characteristic form
on
which is equivalent to the diagonal system
The solution of this system can be given by the generalized hodograph method.
Example
Consider the one-dimensional Euler equations written in terms of density and velocity are
with being the speed of sound is introduced on account of isentropic assumption. Write this system in matrix form
where the matrix from the analysis above the eigenvalues and eigenvectors need to be found. The eigenva
|
https://en.wikipedia.org/wiki/Bone%20morphogenetic%20protein%206
|
Bone morphogenetic protein 6 is a protein that in humans is encoded by the BMP6 gene.
The protein encoded by this gene is a member of the TGFβ superfamily. Bone morphogenetic proteins are known for their ability to induce the growth of bone and cartilage. BMP6 is able to induce all osteogenic markers in mesenchymal stem cells.
The bone morphogenetic proteins (BMPs) are a family of secreted signaling molecules that can induce ectopic bone growth. BMPs are part of the transforming growth factor-beta (TGFB) superfamily. BMPs were originally identified by an ability of demineralized bone extract to induce endochondral osteogenesis in vivo in an extraskeletal site. Based on its expression early in embryogenesis, the BMP encoded by this gene has a proposed role in early development. In addition, the fact that this BMP is closely related to BMP5 and BMP7 has led to speculation of possible bone inductive activity.
As of April 2009, an additional function of BMP6 has been identified as described in Nature Genetics April; 41 [4]:386-8. BMP6 is the key regulator of hepcidin, the small peptide secreted by the liver which is the major regulator of iron metabolism in mammals.
|
https://en.wikipedia.org/wiki/Capitulum%20of%20the%20humerus
|
In human anatomy of the arm, the capitulum of the humerus is a smooth, rounded eminence on the lateral portion of the distal articular surface of the humerus. It articulates with the cup-shaped depression on the head of the radius, and is limited to the front and lower part of the bone.
In non-human tetrapods, the name capitellum is generally used, with "capitulum" limited to the anteroventral articular facet of the rib (in archosauromorphs).
Lepidosauromorpha
Lepidosaurs show a distinct capitellum and trochlea on the centre of the ventral (anterior in upright taxa) surface of the humerus at the distal end.
Archosauromorpha
In non-avian archosaurs, including crocodiles, the capitellum and the trochlea are no longer bordered by distinct etc.- and entepicondyles respectively, and the distal humerus consists two gently expanded condyles, one lateral and one medial, separated by a shallow groove and a supinator process. Romer (1976) homologizes the capitellum in Archosauromorphs with the groove separating the medial and lateral condyles.
In birds, where forelimb anatomy has an adaptation for flight, its functional if not ontogenetic equivalent is the dorsal condyle of the humerus.
Additional images
|
https://en.wikipedia.org/wiki/Sensor%20Media%20Access%20Control
|
Sensor Media Access Control(S-MAC) is a network protocol for sensor networks. Sensor networks consist of tiny, wirelessly communicating computers (sensor nodes), which are deployed in large numbers in an area to network independently and as long as monitor their surroundings in group work with sensors, to their energy reserves are depleted. A special form of ad hoc network, they make entirely different demands on a network protocol (for example, the Internet) and therefore require network protocols specially build for them (SMAC). Sensor Media Access Control specifies in detail how the nodes of a sensor network exchange data, controls the Media Access Control (MAC) to access the shared communication medium of the network, regulates the structure of the network topology, and provides a method for synchronizing.
Although today primarily of academic interest, S-MAC was a significant step in sensor network research and inspired many subsequent network protocols. It was introduced in 2001 by Wei Ye, John Heidemann and Deborah Estrin of the University of Southern California and was intended to conserve scarce, non-rechargeable energy resources of sensor nodes. The development was supported financially by the US military agency DARPA under the project Sensor Information Technology (Sensit).
See also
Zebra Media Access Control
802.11
handshaking
Load balancer
External links
Sensor-MAC (S-MAC): Medium Access Control for Wireless Sensor Networks
|
https://en.wikipedia.org/wiki/Siesta
|
A siesta (from Spanish, pronounced and meaning "nap") is a short nap taken in the early afternoon, often after the midday meal. Such a period of sleep is a common tradition in some countries, particularly those in warm-weather zones. The "siesta" can refer to the nap itself, or more generally to a period of the day, generally between 2–5p.m. This period is used for sleep, as well as leisure, mid-day meals, or other activities.
Siestas are historically common throughout the Mediterranean and Southern Europe, the Middle East, mainland China, and the Indian subcontinent. The siesta is an old tradition in Spain and, through Spanish influence, most of Latin America. The Spanish word derives originally from the Latin word ('sixth hour', counting from dawn, hence "midday rest").
Factors explaining the geographical distribution of the modern siesta are warm temperatures and heavy intake of food at the midday meal. Combined, these two factors contribute to the feeling of post-lunch drowsiness. In many countries that practice the siesta, the summer heat can be unbearable in the early afternoon, making a midday break at home welcome.
Biological need for naps
The timing of sleep in humans depends upon a balance between homeostatic sleep propensity, the need for sleep as a function of the amount of time elapsed since the last adequate sleep episode, and circadian rhythms which determine the ideal timing of a correctly structured and restorative sleep episode. The homeostatic pressure to sleep starts growing upon awakening. The circadian signal for wakefulness starts building in the (late) afternoon. As professor of sleep medicine Charles Czeisler notes, "The circadian system is set up in a beautiful way to override the homeostatic drive for sleep."
Thus, in many people, there is a dip when the drive for sleep has been building for hours and the drive for wakefulness has not yet started. This is, again quoting Czeisler, "a great time for a nap". The drive for wakefulness i
|
https://en.wikipedia.org/wiki/National%20symbols%20of%20Iran
|
Official symbols
Flag
Emblem
Derafsh Kaviani
Lion and Sun
Faravahar
Emblem of Iran
Anthem
Salām-e Shāh
Imperial Anthem of Iran
Ey Iran
Payandeh Bada Iran
Unofficial symbols
Cultural heritage
Musical instruments
SanturSetar
Tar
Kamancheh
Ney-anban
Chang
Daf
Holidays
Nowruz
13 Be-Dar
Tirgan
Mehregan
Yalda
Sadeh
Chaharshanbe Suri
LiteratureAvestaShahnamehMasnaviDivan of HafezGulistanBustan''
Mythology
Keyumars
Mashya and Mashyana
Jamshid
Arash
Rostam
Zahhak
Fereydun
Homa (griffin)
Shahbaz
Simorgh
Chamrosh
Games
Chess (Shatranj)
Backgammon (Nard)
Hokm
Shelem
Sports
Wrestling
Pahlevani and zoorkhaneh rituals
Polo
Arts
Persian calligraphy
Persian carpet
Persian literature
Persian miniature
Colors
Persian green
Persian blue
Persian red
Cuisine
Chelo kabab
Ghorme sabzi
Fesenjan
Abgoosht/Dizi stoneware
Salad Shirazi
Caviar/Beluga Sturgeon
Animals
Persian/Asiatic lion
Asiatic cheetah
Persian leopard
Persian cat
Persian fallow deer
Caspian horse
Nightingale
Falcon
Plants
Lotus
Rose
Saffron
Hyacinth
Lily
Pomegranate
Pistachio
Cypress
Tulip
Natural Monuments, Places, Architecture
Royal stars: Aldeberan, Regulus, Fomalhaut, Antares
Alborz
Mount Damavand
Persian Gulf
Persepolis
Azadi Tower/Azadi Square
Milad Tower
Pasargadae
Naqsh-e Jahan Square
Rostam's Mural
Rudkhan Castle
Persian gardens
Windcatcher
Qanat
People
Cyrus the Great
Avicenna
Ferdowsi
Hafez
Rumi
Omar Khayyam
Saadi
Attar of Nishapur
Nizami
Naser Khosrow
|
https://en.wikipedia.org/wiki/ZX81%20character%20set
|
The ZX81 character set is the character encoding used by the Sinclair Research ZX81 family of microcomputers including the Timex Sinclair 1000 and Timex Sinclair 1500. The encoding uses one byte per character for 256 code points. It has no relationship with previously established ones like ASCII or EBCDIC, but it is related though not identical to the character set of the predecessor ZX80.
Printable characters
The character set has 64 unique glyphs present at code points 0–63. With the most significant bit set the character is generated in inverse video; corresponding to code points 128–191. These 128 values are the only displayable ones allowed in the video memory (known as the display file). The remaining code points (64–127 and 192–255) are used as control characters such as 118 for newline or, uniquely to Sinclair BASIC, for keywords, while some are unused.
The small effective range of only 64 unique glyphs precludes support for Latin lower case letters, and many symbols used widely in computing such as the exclamation point and the at sign. The lack of an apostrophe led some software authors to use a comma instead.
There are 11 block graphics characters, counting code point 0 which also doubles as space. The first 8 of these together with their 8 inverse video versions (16 code points) provide every combination of the character cell divided into 2×2 black-and-white block pixels for low-resolution 64×48 pixel graphics. These 2×2 blocks are present in the Block Elements Unicode block. An additional 3 characters provide a cell divided into 1×2 black, white or dithered gray wide block pixels. These, in combination with their inverse video versions and some of the previous 2×2 blocks provides for a 32×48 resolution with 3 levels (white, dithered gray, black). The basic 11 characters plus their inverse video versions, makes for 22 block graphics characters in total. The dithered characters (of which there are 6) are also available in Unicode (mostly in the Symbol
|
https://en.wikipedia.org/wiki/Aminiphilus
|
Aminiphilus is a Gram-negative, non-spore-forming and motile genus of bacteria from the family of Synergistaceae with one known species (Aminiphilus circumscriptus). Aminiphilus circumscriptus has been isolated from anaerobic sludge from Colombia.
|
https://en.wikipedia.org/wiki/Blueberry%20sauce
|
Blueberry sauce is a sauce prepared using blueberries as a primary ingredient. It is typically prepared as a reduction, and can be used as a dessert sauce or savory sauce depending on the preparation. It can also be used in the preparation of the blueberry Martini.
Preparation
Fresh or frozen blueberries, and sometimes wild blueberries are used. It may be prepared to have a smooth or chunky texture. Straining the sauce using a sieve to remove particulate matter creates a smooth texture. It can be preserved by freezing for later use. There are sweet and savory versions of the sauce.
Savory
Savory blueberry sauces can be prepared without a sweetener, or with a small amount of sweetener, and additional ingredients used can include cider vinegar, chicken broth, lemon juice, salt, pepper and corn starch. The sauce is used to top various savory dishes such as roasted pork, chicken, lamb and duck. It is sometimes served on the side, rather than atop dishes.
Sweet
Sweet blueberry sauce, also called blueberry compote, may be used as a dessert sauce. Blueberries and water provide the base for the sauce, but after that recipes vary. A sweetener such as sugar is typically used, and lemon juice, orange juice, butter and corn starch are sometimes added. A spiced version can be made using cloves, cinnamon and cardamom. Sweet blueberry sauce can be used in or to top desserts such as cheesecake, cake, and ice cream, and on breakfast dishes such as pancakes, waffles and French toast. It can also be used to create a blueberry fool.
Other uses
Blueberry sauce can be used in the preparation of the blueberry Martini cocktail. It can also be used to create a blueberry fool.
Gallery
See also
List of dessert sauces
List of sauces
|
https://en.wikipedia.org/wiki/Abel%E2%80%93Jacobi%20map
|
In mathematics, the Abel–Jacobi map is a construction of algebraic geometry which relates an algebraic curve to its Jacobian variety. In Riemannian geometry, it is a more general construction mapping a manifold to its Jacobi torus.
The name derives from the theorem of Abel and Jacobi that two effective divisors are linearly equivalent if and only if they are indistinguishable under the Abel–Jacobi map.
Construction of the map
In complex algebraic geometry, the Jacobian of a curve C is constructed using path integration. Namely, suppose C has genus g, which means topologically that
Geometrically, this homology group consists of (homology classes of) cycles in C, or in other words, closed loops. Therefore, we can choose 2g loops generating it. On the other hand, another more algebro-geometric way of saying that the genus of C is g is that
where K is the canonical bundle on C.
By definition, this is the space of globally defined holomorphic differential forms on C, so we can choose g linearly independent forms . Given forms and closed loops we can integrate, and we define 2g vectors
It follows from the Riemann bilinear relations that the generate a nondegenerate lattice (that is, they are a real basis for ), and the Jacobian is defined by
The Abel–Jacobi map is then defined as follows. We pick some base point and, nearly mimicking the definition of define the map
Although this is seemingly dependent on a path from to any two such paths define a closed loop in and, therefore, an element of so integration over it gives an element of Thus the difference is erased in the passage to the quotient by . Changing base-point does change the map, but only by a translation of the torus.
The Abel–Jacobi map of a Riemannian manifold
Let be a smooth compact manifold. Let be its fundamental group. Let be its abelianisation map. Let be the torsion subgroup of . Let be the quotient by torsion. If is a surface, is non-canonically isomorphic to , wher
|
https://en.wikipedia.org/wiki/The%20Death%20Guard
|
The Death Guard is the only published novel of the English author Philip George Chadwick (1893 in Batley, Yorkshire – 1955 in Brighton, Sussex). Although the author is virtually unknown to the wider public, his work has received attention from literary scholars. The novel contains many themes later developed by L Ron Hubbard and James Blish. Chadwick was a political thinker with socialist tendencies, a Fabian and subsequently an Independent and a disciple of H.G. Wells.
Legend has it that H.G. Wells used to refer to this book as one of the greatest he had ever read. It was written shortly after World War I, but by the time it was picked up for publication, World War II was already underway and allegedly, Chadwick had been killed in combat, though the 1992 paperback states that he died in 1955. To complicate matters even further, the printing house that was handling the first run of the novel was bombed in an air raid, and almost all copies were destroyed. Consequently, most science fiction fans wrote off The Death Guard as pure myth, a figment of Wells's prodigious imagination, and for years it was considered a lost novel. In 1992 it was republished,
with an introduction by Brian Aldiss.
The Death Guard was cited in Karl Edward Wagner's "The Thirteen Best Science Fiction Horror Novels"
and Ramsey Campbell's "Thirteen Novels on the Edge of Horror".
Plot summary
In its tale of a chemist who creates an army of bloodthirsty plant-based humanoids out of a desire to abolish war once and for all (the rationale being that no country would attack England if it were known she possessed such a defence), the book foreshadowed the rise of nuclear weapons and Cold War politics. Continental Europe forms an alliance and invades Britain.
The book is divided into three parts. In the first part of this novel we meet the inventors of the artificial life. We follow their story from their first meeting through the time when they relocate their lab to the Congo for its more conduciv
|
https://en.wikipedia.org/wiki/EPPE-holin%20family
|
The Erwinia Phage Phi-Ea1h Holin (EPPE-Hol) Family (TC# 1.E.58) consists of a single protein, holin of Erwinia Phage Phi-Ea1h (TC# 1.E.58.1.1), which is 119 amino acyl residues in length and exhibits a single transmembrane segment (TMS). Out of three open reading frames sequenced from bacteriophage Phi-Ea1h, the second ORF encodes this holin. Kim and Geider found that no signal sequence was observed at the N-terminus of the enzyme and suggested that the holin possibly facilities the export of an which may export a lysozyme and EPS depolymerase that carries out extracellular polysaccharide (EPS)-degrading activity.
See also
Holin
Lysin
Transporter Classification Database
Further reading
|
https://en.wikipedia.org/wiki/Trailblazer%20%28video%20game%29
|
Trailblazer is a racing video game developed by Mr. Chip Software and published by Gremlin Graphics for the ZX Spectrum, Commodore 64, Atari 8-bit family, Amstrad CPC and Commodore 16/Plus/4 in 1986 (there was also an enhanced version on Amstrad CPC 3" disc). It was ported to the Amiga and Atari ST.
In 2005 a remake for the Gizmondo was released, and was also adapted in 2011 for the PS3, PlayStation Portable, PS Vita and PlayStation TV as part of the Playstation Mini series.
The game received a direct sequel titled Cosmic Causeway: Trailblazer II in 1987.
Gameplay
Trailblazer is a racing game which players play as a soccer ball along a series of suspended passages. The game can be played either in time trial or arcade mode and four track. The races usually last between 15 and 45 seconds. Special fields on the track let the ball jump (blue), slow down (red), speed up (green) or warp speed the ball (white), invert the controls (cyan/light blue), bounce it backwards (purple) or are holes (black).
Development
Shaun Southern had made some great games for the Commodore 16 before he moved onto the Amiga and the game was inspired by the arcade game Metrocross.
Reception
The game was reviewed in 1990 in Dragon #158 by Hartley, Patricia, and Kirk Lesser in "The Role of Computers" column, as part of the Mastertronic MEGA Pack of 10 games previously released in Europe. The reviewers gave the game 5 out of 5 stars, stating: "Our favorite on this disk; racing on Cosmic Causeway roads against the clock or against a robot. This one was really fun".
Zzap!64'''s reviewers also enjoyed the game which they thought was "an excellent variation on the race game theme". The overall rating given was 93%, qualifying the C64 version for the magazine's Sizzler award. Steve Panak, reviewing the Atari 8-bit version for ANALOG Computing, concluded that "the game is the most original arcade action wristbuster to come down the pike in a long time, and one of the best two-player competition
|
https://en.wikipedia.org/wiki/Inverse%20depth%20parametrization
|
In computer vision, the inverse depth parametrization is a parametrization used in methods for 3D reconstruction from multiple images such as simultaneous localization and mapping (SLAM). Given a point in 3D space observed by a monocular pinhole camera from multiple views, the inverse depth parametrization of the point's position is a 6D vector that encodes the optical centre of the camera when in first observed the point, and the position of the point along the ray passing through and .
Inverse depth parametrization generally improves numerical stability and allows to represent points with zero parallax. Moreover, the error associated to the observation of the point's position can be modelled with a Gaussian distribution when expressed in inverse depth. This is an important property required to apply methods, such as Kalman filters, that assume normality of the measurement error distribution. The major drawback is the larger memory consumption, since the dimensionality of the point's representation is doubled.
Definition
Given 3D point with world coordinates in a reference frame , observed from different views, the inverse depth parametrization of is given by:
where the first five components encode the camera pose in the first observation of the point, being the optical centre, the azimuth, the elevation angle, and the inverse depth of at the first observation.
|
https://en.wikipedia.org/wiki/Methylcitrate%20cycle
|
The methylcitrate cycle, or the MCC, is the mechanism by which propionyl-CoA is formed, generated by β-oxidation of odd-chain fatty acids, and broken down to its final products, succinate and pyruvate. The methylcitrate cycle is closely related to both the citric acid cycle and the glyoxylate cycle, in that they share substrates, enzymes and products. The methylcitrate cycle functions overall to detoxify bacteria of toxic propionyl-CoA, and plays an essential role in propionate metabolism in bacteria. Incomplete propionyl-CoA metabolism may lead to the buildup of toxic metabolites in bacteria, and thus the function of the methylcitrate cycle is an important biological process.
History
2-methylisocitric acid, an intermediate of the methylcitrate cycle, was first synthesized in 1886 as a mixture of four isomers. The pathway of the methylcitrate cycle was not discovered until 1973 in fungi, though it was not yet fully understood. Originally, the methylcitrate cycle was thought to be present only in fungal species, such as Candida lipolytica and Aspergillus nidulans. In 1999, it was discovered that the methylcitrate cycle was also present in bacteria Salmonella enterica and Escherichia coli. Much research has been done on the methylcitrate cycle's role in the development and function of various fungi and strains of bacteria, as well as its virulent properties in conjunction with the glyoxylate cycle.
Steps
There are three basic steps in the methylcitrate cycle, as outlined below. Additionally, the mechanism is shown with its reactants, products, intermediates, and enzymes.
The major enzymes involved in this process are methylcitrate synthase (MCS) in step one, methylcitrate dehydratase (MCD) in step two, and 2-methylisocitrate lyase (MCL) in step three.
The PrpC gene, which encodes for enzyme methylcitrate synthase in the first step of the methylcitrate cycle, is the gene responsible for propionate metabolism in the process. Without this gene, the methylcitrate cyc
|
https://en.wikipedia.org/wiki/Egli-Figuren
|
Egli-Figuren ("Egli figures" or Biblische Erzählfiguren) are a type of doll with movable limbs, originating in Switzerland in 1964, and popular in German Christian circles for telling Bible stories. The Arbeitsgemeinschaft Biblische Figuren ABF e.V. is one of the oldest associations promoting the puppets.
|
https://en.wikipedia.org/wiki/Antiisomorphism
|
In category theory, a branch of mathematics, an antiisomorphism (or anti-isomorphism) between structured sets A and B is an isomorphism from A to the opposite of B (or equivalently from the opposite of A to B). If there exists an antiisomorphism between two structures, they are said to be antiisomorphic.
Intuitively, to say that two mathematical structures are antiisomorphic is to say that they are basically opposites of one another.
The concept is particularly useful in an algebraic setting, as, for instance, when applied to rings.
Simple example
Let A be the binary relation (or directed graph) consisting of elements {1,2,3} and binary relation defined as follows:
Let B be the binary relation set consisting of elements {a,b,c} and binary relation defined as follows:
Note that the opposite of B (denoted Bop) is the same set of elements with the opposite binary relation (that is, reverse all the arcs of the directed graph):
If we replace a, b, and c with 1, 2, and 3 respectively, we see that each rule in Bop is the same as some rule in A. That is, we can define an isomorphism from A to Bop by . is then an antiisomorphism between A and B.
Ring anti-isomorphisms
Specializing the general language of category theory to the algebraic topic of rings, we have:
Let R and S be rings and f: R → S be a bijection. Then f is a ring anti-isomorphism if
If R = S then f is a ring anti-automorphism.
An example of a ring anti-automorphism is given by the conjugate mapping of quaternions:
Notes
|
https://en.wikipedia.org/wiki/Ovule
|
In seed plants, the ovule is the structure that gives rise to and contains the female reproductive cells. It consists of three parts: the integument, forming its outer layer, the nucellus (or remnant of the megasporangium), and the female gametophyte (formed from a haploid megaspore) in its center. The female gametophyte — specifically termed a megagametophyte— is also called the embryo sac in angiosperms. The megagametophyte produces an egg cell for the purpose of fertilization. The ovule is a small structure present in the ovary. It is attached to the placenta by a stalk called a funicle. The funicle provides nourishment to the ovule.
Location within the plant
In flowering plants, the ovule is located inside the portion of the flower called the gynoecium. The ovary of the gynoecium produces one or more ovules and ultimately becomes the fruit wall. Ovules are attached to the placenta in the ovary through a stalk-like structure known as a funiculus (plural, funiculi). Different patterns of ovule attachment, or placentation, can be found among plant species, these include:
Apical placentation: The placenta is at the apex (top) of the ovary. Simple or compound ovary.
Axile placentation: The ovary is divided into radial segments, with placentas in separate locules. Ventral sutures of carpels meet at the centre of the ovary. Placentae are along fused margins of carpels. Two or more carpels. (e.g. Hibiscus, Citrus, Solanum)
Basal placentation: The placenta is at the base (bottom) of the ovary on a protrusion of the thalamus (receptacle). Simple or compound carpel, unilocular ovary. (e.g. Sonchus, Helianthus, Asteraceae)
Free-central placentation: Derived from axile as partitions are absorbed, leaving ovules at the central axis. Compound unilocular ovary. (e.g. Stellaria, Dianthus)
Marginal placentation: Simplest type. There is only one elongated placenta on one side of the ovary, as ovules are attached at the fusion line of the carpel's margins . This is conspicuous i
|
https://en.wikipedia.org/wiki/History%20of%20electrical%20engineering
|
This article details the history of electrical engineering. The first substantial practical use of electricity was electromagnetism.
Ancient developments
Long before any knowledge of electricity existed, people were aware of shocks from electric fish. Ancient Egyptian texts dating from 2750 BCE referred to these fish as the "Thunderer of the Nile", and described them as the "protectors" of all other fish. Electric fish were again reported millennia later by ancient Greek, Roman and Arabic naturalists and physicians. Several ancient writers, such as Pliny the Elder and Scribonius Largus, attested to the numbing effect of electric shocks delivered by electric catfish and electric rays, and knew that such shocks could travel along conducting objects. Patients with ailments such as gout or headache were directed to touch electric fish in the hope that the powerful jolt might cure them. Possibly the earliest and nearest approach to the discovery of the identity of lightning, and electricity from any other source, is to be attributed to the Arabs, who before the 15th century had the Arabic word for lightning ra‘ad () applied to the electric ray.
Ancient cultures around the Mediterranean knew that certain objects, such as rods of amber, could be rubbed with cat's fur to attract light objects like feathers. Thales of Miletus, an ancient Greek philosopher, writing at around 600 BCE, described a form of static electricity, noting that rubbing fur on various substances, such as amber, would cause a particular attraction between the two. He noted that the amber buttons could attract light objects such as hair and that if they rubbed the amber for long enough they could even get a spark to jump.
At around 450 BCE Democritus, a later Greek philosopher, developed an atomic theory that was similar to modern atomic theory. His mentor, Leucippus, is credited with this same theory. The hypothesis of Leucippus and Democritus held everything to be composed of atoms. But these atoms,
|
https://en.wikipedia.org/wiki/WJNK-LD
|
WJNK-LD (channel 34) is a low-power television station in Nashville, Tennessee, United States. The station is owned by Edge Spectrum, Inc.
History
Early years
The station signed on the air on June 25, 1986, under the ownership of Tiger Eye Broadcasting as W61AR, broadcasting on analog UHF channel 61. The station moved to analog channel 54 for a few months under the callsign W52AR from January until April 1989, when it returned to channel 61 and reverted to the station's original callsign. The station became WJNK-LP when it relocated to analog channel 34 in 1997, and had broadcasting on that channel ever since. From the station's sign on in 1986 until 1999, the station was an independent station and also carried FamilyNet as a secondary affiliation.
As a 3ABN O&O station
On January 20, 1999, Tiger Eye Broadcasting sold WJNK-LP to 3ABN. The sale of the station was finalized on April 13, 1999, and at the same time, the station switched to broadcasting Religious Programming from 3ABN 24 hours a day, as the station would broadcast in that format & broadcast programming from 3ABN until December 10, 2021.
Sale to Edge Spectrum
On March 9, 2017, Three Angels Broadcasting Network filed to sell WJNK-LD to Edge Spectrum Inc. The sale & transfer was finalized on August 31, 2017. 3ABN would continue to operate the Station, Until October 1, 2018, when Edge Spectrum fully took over operations of WJNK. Also under new ownership & on October 1, 2018, 3ABN Proclaim was discontinued from 34.2, to make way for a new religious network "Quo Vadis", which debuted on November 1, 2018, In addition, 3ABN Latino was also discontinued from 34.4, and it would be replaced a month later with Daystar on November 15, 2018. However, on January 1, 2019, both Quo Vadis and Daystar would be discontinued from channels 34.2 and 34.4 at the same time without warning.
Conversion to ATSC 3.0
Edge Spectrum (Owner of WJNK-LD) recently announced that all of their stations (including WJNK-LD) will convert t
|
https://en.wikipedia.org/wiki/Kenneth%20Arrow
|
Kenneth Joseph Arrow (23 August 1921 – 21 February 2017) was an American economist, mathematician, writer, and political theorist. He was the joint winner of the Nobel Memorial Prize in Economic Sciences with John Hicks in 1972.
In economics, Arrow was a major figure in post-World War II neo-classical economic theory. Many of his former graduate students have gone on to win the Nobel Memorial Prize themselves. His most significant works are his contributions to social choice theory, notably "Arrow's impossibility theorem," and his work on general equilibrium analysis. He has also provided foundational work in many other areas of economics, including endogenous growth theory and the economics of information.
Education and early career
Arrow was born on 23 August 1921, in New York City. Arrow's mother, Lilian (Greenberg), was from Iași, Romania, and his father, Harry Arrow, was from nearby Podu Iloaiei. The Arrow family were Romanian Jews. His family was very supportive of his education. Growing up during the Great Depression, he embraced socialism in his youth. He would later move away from socialism, but his views retained a left-leaning philosophy.
He graduated from Townsend Harris High School and then earned a Bachelor's degree from the City College of New York in 1940 in mathematics, where he was a member of Sigma Phi Epsilon. He then attended Columbia University for graduate studies, obtaining a Master's degree in mathematics in June 1941. While there, Arrow studied under Harold Hotelling, who influenced him to change fields to economics. He served as a weather officer in the United States Army Air Forces from 1942 to 1946.
Academic career
From 1946 to 1949 Arrow spent his time partly as a graduate student at Columbia and partly as a research associate at the Cowles Commission for Research in Economics at the University of Chicago. During that time he also held the rank of Assistant Professor in Economics at the University of Chicago and worked at the RAND
|
https://en.wikipedia.org/wiki/Multiple%20chemical%20sensitivity
|
Multiple chemical sensitivity (MCS), also known as idiopathic environmental intolerances (IEI), is an unrecognized and controversial diagnosis characterized by chronic symptoms attributed to exposure to low levels of commonly used chemicals. Symptoms are typically vague and non-specific. They may include fatigue, headaches, nausea, and dizziness.
Although these symptoms can be debilitating, MCS is not recognized as an organic, chemical-caused illness by the World Health Organization, American Medical Association, nor any of several other professional medical organizations. Blinded clinical trials show that people with MCS react as often and as strongly to placebos as they do to chemical stimuli; the existence and severity of symptoms is seemingly related to the perception that a chemical stimulus is present.
Commonly attributed substances include scented products (e.g. perfumes), pesticides, plastics, synthetic fabrics, smoke, petroleum products, and paint fumes.
Symptoms
Symptoms are typically vague and non-specific, such as fatigue or headaches. These symptoms, although they can be disabling, are called non-specific because they are not associated with any single specific medical condition.
A 2010 review of MCS literature said that the following symptoms, in this order, were the most reported in the condition: headache, fatigue, confusion, depression, shortness of breath, arthralgia, myalgia, nausea, dizziness, memory problems, gastrointestinal symptoms, respiratory symptoms.
Symptoms mainly arise from the autonomic nervous system (such as nausea or dizziness) or have psychiatric or psychological aspects (such as difficulty concentrating).
Possible causes
Various different causes for MCS have been hypothesized.
There is a general agreement among most MCS researchers that the cause is not specifically related to sensitivity to chemicals, but this does not preclude the possibility that symptoms are caused by other known or unknown factors. Various health c
|
https://en.wikipedia.org/wiki/In-circuit%20testing
|
In-circuit testing (ICT) is an example of white box testing where an electrical probe tests a populated printed circuit board (PCB), checking for shorts, opens, resistance, capacitance, and other basic quantities which will show whether the assembly was correctly fabricated. It may be performed with a "bed of nails" test fixture and specialist test equipment, or with a fixtureless in-circuit test setup.
Fixtures for in-circuit testing
A common form of in-circuit testing uses a bed-of-nails tester. This is a fixture that uses an array of spring-loaded pins known as "pogo pins". When a printed circuit board is aligned with and pressed down onto the bed-of-nails tester, the pins make electrical contact with locations on the circuit board, allowing them to be used as test points for in-circuit testing. Bed-of-nails testers have the advantage that many tests may be performed at a time, but have the disadvantage of placing substantial strain on the PCB.
An alternative is the use of flying probes, which place less mechanical strain on the boards being tested. Their advantages and disadvantages are the opposite of bed-of-nails testers: the flying probes must be moved between tests, but they place much less strain on the PCB.
Example test sequence
Discharging capacitors and especially electrolytic capacitors (for safety and measurement stability, this test sequence must be done first before testing any other items)
Contact Test (To verify the test system is connected to the Unit Under Test (UUT)
Shorts testing (Test for solder shorts and opens)
Analog tests (Test all analog components for placement and correct value)
Test for defective open pins on devices
Test for capacitor orientation defects
Power up UUT
Powered analog (Test for correct operation of analog components such as regulators and opamps)
Powered digital (Test the operation of digital components and Boundary scan devices)
JTAG boundary-scan tests
Flash Memory, EEPROM, and other device programmin
|
https://en.wikipedia.org/wiki/Brian%20Schmidt
|
Brian Paul Schmidt (born 24 February 1967) is the Vice-Chancellor of the Australian National University (ANU). He was previously a Distinguished Professor, Australian Research Council Laureate Fellow and astrophysicist at the University's Mount Stromlo Observatory and Research School of Astronomy and Astrophysics. He is known for his research in using supernovae as cosmological probes. He currently holds an Australian Research Council Federation Fellowship and was elected a Fellow of the Royal Society (FRS) in 2012. Schmidt shared both the 2006 Shaw Prize in Astronomy and the 2011 Nobel Prize in Physics with Saul Perlmutter and Adam Riess for providing evidence that the expansion of the universe is accelerating, making him the only Montana-born Nobel laureate.
Early life and education
Schmidt, an only child, was born in Missoula, Montana, where his father Dana C. Schmidt was a fisheries biologist. When he was 13, his family relocated to Anchorage, Alaska.
Schmidt attended Bartlett High School in Anchorage, Alaska, and graduated in 1985. He has said that he wanted to be a meteorologist "since I was about five-years-old [but] ... I did some work at the USA National Weather Service up in Anchorage and didn't enjoy it very much. It was less scientific, not as exciting as I thought it would be—there was a lot of routine. But I guess I was just a little naive about what being a meteorologist meant." His decision to study astronomy, which he had seen as "a minor pastime", was made just before he enrolled at university. Even then, he was not fully committed: he said "I'll do astronomy and change into something else later", and just never made that change.
He graduated with a BS (Physics) and BS (Astronomy) from the University of Arizona in 1989. He received his AM (Astronomy) in 1992 and then PhD (Astronomy) in 1993 from Harvard University. Schmidt's PhD thesis was supervised by Robert Kirshner and used Type II Supernovae to measure the Hubble Constant.
While at Harva
|
https://en.wikipedia.org/wiki/Riemann%20sphere
|
In mathematics, the Riemann sphere, named after Bernhard Riemann, is a model of the extended complex plane: the complex plane plus one point at infinity. This extended plane represents the extended complex numbers, that is, the complex numbers plus a value for infinity. With the Riemann model, the point is near to very large numbers, just as the point is near to very small numbers.
The extended complex numbers are useful in complex analysis because they allow for division by zero in some circumstances, in a way that makes expressions such as well-behaved. For example, any rational function on the complex plane can be extended to a holomorphic function on the Riemann sphere, with the poles of the rational function mapping to infinity. More generally, any meromorphic function can be thought of as a holomorphic function whose codomain is the Riemann sphere.
In geometry, the Riemann sphere is the prototypical example of a Riemann surface, and is one of the simplest complex manifolds. In projective geometry, the sphere can be thought of as the complex projective line , the projective space of all complex lines in . As with any compact Riemann surface, the sphere may also be viewed as a projective algebraic curve, making it a fundamental example in algebraic geometry. It also finds utility in other disciplines that depend on analysis and geometry, such as the Bloch sphere of quantum mechanics and in other branches of physics.
The extended complex plane is also called the closed complex plane.
Extended complex numbers
The extended complex numbers consist of the complex numbers together with . The set of extended complex numbers may be written as , and is often denoted by adding some decoration to the letter , such as
The notation has also seen use, but as this notation is also used for the punctured plane , it can lead to ambiguity.
Geometrically, the set of extended complex numbers is referred to as the Riemann sphere (or extended complex plane).
Arithmet
|
https://en.wikipedia.org/wiki/Diplopora%20oregonensis
|
Diplopora oregonensis is a species of algae in the genus Diplopora in the family Diploporaceae. It is a unique species of marine dasycladacean algae from the Triassic period. It was discovered by George Stanley of the University of Montana, with findings published in the 1980s. It was obtained from sands and shales of the Wallowa volcanic archipelago, more specifically the Hurwal Formation in eastern Oregon. The strata of this formation developed from geologic processing of limestone deposits. The deposits were produced along the floors of lagoons of an ancient shallow ocean.
|
https://en.wikipedia.org/wiki/Free%20entropy
|
A thermodynamic free entropy is an entropic thermodynamic potential analogous to the free energy. Also known as a Massieu, Planck, or Massieu–Planck potentials (or functions), or (rarely) free information. In statistical mechanics, free entropies frequently appear as the logarithm of a partition function. The Onsager reciprocal relations in particular, are developed in terms of entropic potentials. In mathematics, free entropy means something quite different: it is a generalization of entropy defined in the subject of free probability.
A free entropy is generated by a Legendre transformation of the entropy. The different potentials correspond to different constraints to which the system may be subjected.
Examples
The most common examples are:
where
is entropy
is the Massieu potential
is the Planck potential
is internal energy
is temperature
is pressure
is volume
is Helmholtz free energy
is Gibbs free energy
is number of particles (or number of moles) composing the i-th chemical component
is the chemical potential of the i-th chemical component
is the total number of components
is the th components.
Note that the use of the terms "Massieu" and "Planck" for explicit Massieu-Planck potentials are somewhat obscure and ambiguous. In particular "Planck potential" has alternative meanings. The most standard notation for an entropic potential is , used by both Planck and Schrödinger. (Note that Gibbs used to denote the free energy.) Free entropies where invented by French engineer François Massieu in 1869, and actually predate Gibbs's free energy (1875).
Dependence of the potentials on the natural variables
Entropy
By the definition of a total differential,
From the equations of state,
The differentials in the above equation are all of extensive variables, so they may be integrated to yield
Massieu potential / Helmholtz free entropy
Starting over at the definition of and taking the total differential, we have via a Legendre transform (and the c
|
https://en.wikipedia.org/wiki/Sexual%20jealousy
|
Sexual jealousy is a special form of jealousy in sexual relationships, based on suspected or imminent sexual infidelity. The concept is studied in the field of evolutionary psychology.
Basis
Evolutionary psychologists have suggested that there is a gender difference in sexual jealousy, driven by men and women's different reproductive biology. The theory proposes that a man perceives a threat to his relationship's future because he could be fooled into raising children that are not his own. In contrast, a woman risks losing to another the relationship and all the benefits that entails. Research has shown that men are impacted more by sexual infidelity, while women are more impacted by emotional infidelity.
An alternative explanation is from a social-cognitive perspective. Typically, men place importance on their masculinity and sexual dominance. When the male's partner commits sexual infidelity, these two components of his ego become severely threatened. Women are more emotionally invested in a relationship, and therefore experience a threat to their self-perception when a partner commits infidelity, more concerned with risk to the emotional content than the sexual.
Some research has suggested that there are no gender differences in sexual jealousy, concluding that males and females both equally experience distress over emotional and sexual infidelity. Sexual jealousy is cross-culturally universal but how it manifests itself may differ across cultures.
Gender-specific behaviors
Female
Psychologists have found that males react very strongly to sexual infidelity, whereas females are more likely to forgive a one-time sexual adventure if it does not threaten the male parental investment. Therefore, jealousy is likely to be evoked in females if they feel that their partner may leave them for another woman; this has been shown to be more likely to occur if the male commits emotional infidelity. Emotional infidelity occurs when one partner develops a meaningful, emot
|
https://en.wikipedia.org/wiki/History%20of%20the%20function%20concept
|
The mathematical concept of a function dates from the 17th century in connection with the development of the calculus; for example, the slope of a graph at a point was regarded as a function of the x-coordinate of the point. Functions were not explicitly considered in antiquity, but some precursors of the concept can perhaps be seen in the work of medieval philosophers and mathematicians such as Oresme.
Mathematicians of the 18th century typically regarded a function as being defined by an analytic expression. In the 19th century, the demands of the rigorous development of analysis by Weierstrass and others, the reformulation of geometry in terms of analysis, and the invention of set theory by Cantor, eventually led to the much more general modern concept of a function as a single-valued mapping from one set to another.
Functions before the 17th century
Already in the 12th century, mathematician Sharaf al-Din al-Tusi analyzed the equation in the form stating that the left hand side must at least equal the value of for the equation to have a solution. He then determined the maximum value of this expression. It is arguable that the isolation of this expression is an early approach to the notion of a "function". A value less than means no positive solution; a value equal to corresponds to one solution, while a value greater than corresponds to two solutions. Sharaf al-Din's analysis of this equation was a notable development in Islamic mathematics, but his work was not pursued any further at that time, neither in the Muslim world nor in Europe.
According to Dieudonné and Ponte, the concept of a function emerged in the 17th century as a result of the development of analytic geometry and the infinitesimal calculus. Nevertheless, Medvedev suggests that the implicit concept of a function is one with an ancient lineage. Ponte also sees more explicit approaches to the concept in the Middle Ages:
Historically, some mathematicians can be regarded as having foresee
|
https://en.wikipedia.org/wiki/Huntington%27s%20disease%20in%20popular%20culture
|
Huntington's disease has been shown in numerous formats, more so as awareness of the condition has increased. Here is a list of references to it in popular culture;
Books
Ann Brashares's 2011 novel Sisterhood Everlasting (later found one of the four "sisters", Tibby Rollins, had HD)
James S. A. Corey's 2015 novella The Vital Abyss, part of The Expanse book series (reveals the backstory of the former Protogen researcher Paolo Cortázar, whose mother was diagnosed with "Type C Huntington's" in his adolescence, which was the primary impetus for his becoming a research scientist).
Kathy Reichs' 2020 novel A Conspiracy of Bones
Lisa Genova's 2015 novel Inside the O'Briens (relates the slow development of HD in the main character, a Boston police officer, and its effects on his identity, work, and family)
Pål Johan Karlsen's 2002 novel Daimler (main character Daniel Grimsgaard is affected).
Joe Klein's Woody Guthrie: A Life: The book discloses the effects of the disorder in both Woody Guthrie and his mother.
Ian McEwan's 2005 novel Saturday. The character of Baxter is negatively portrayed in his affliction.
Nick O'Donohoe's Crossroads books (BJ Vaughan has HD).
Ruth Rendell, writing as Barbara Vine, 1989 British novel The House of Stairs (main character Elizabeth Vetch is at risk).
Robert J. Sawyer's 1997 novel Frameshift (main character Pierre Tardivel).
Steven T. Seagle's autobiographical 2004 graphic novel It's a Bird... features the author coming to grips with the presence of HD in his family.
Dorothy Norvell Snyder's semi-autobiographical 1980 novel Heirloom: A Novel, How One Family Lived with One of Life's Cruelest Diseases—Huntington's.
Mary Helen Specht's 2015 novel Migratory Animals.
Jacqueline Susann's 1966 novel Valley of the Dolls (night club singer Tony Polar).
Diane Tullson's 2001 novel Saving Jasey (Trist, Jasey and their grandfather).
Kurt Vonnegut's 1985 novel Galapagos.
Nancy Werlin's 2004 novel Double Helix (Ava Samuels (mother of the
|
https://en.wikipedia.org/wiki/Rotational%E2%80%93vibrational%20spectroscopy
|
Rotational–vibrational spectroscopy is a branch of molecular spectroscopy concerned with infrared and Raman spectra of molecules in the gas phase. Transitions involving changes in both vibrational and rotational states can be abbreviated as rovibrational (or ro-vibrational) transitions. When such transitions emit or absorb photons (electromagnetic radiation), the frequency is proportional to the difference in energy levels and can be detected by certain kinds of spectroscopy. Since changes in rotational energy levels are typically much smaller than changes in vibrational energy levels, changes in rotational state are said to give fine structure to the vibrational spectrum. For a given vibrational transition, the same theoretical treatment as for pure rotational spectroscopy gives the rotational quantum numbers, energy levels, and selection rules. In linear and spherical top molecules, rotational lines are found as simple progressions at both higher and lower frequencies relative to the pure vibration frequency. In symmetric top molecules the transitions are classified as parallel when the dipole moment change is parallel to the principal axis of rotation, and perpendicular when the change is perpendicular to that axis. The ro-vibrational spectrum of the asymmetric rotor water is important because of the presence of water vapor in the atmosphere.
Overview
Ro-vibrational spectroscopy concerns molecules in the gas phase. There are sequences of quantized rotational levels associated with both the ground and excited vibrational states. The spectra are often resolved into lines due to transitions from one rotational level in the ground vibrational state to one rotational level in the vibrationally excited state. The lines corresponding to a given vibrational transition form a band.
In the simplest cases the part of the infrared spectrum involving vibrational transitions with the same rotational quantum number (ΔJ = 0) in ground and excited states is called the Q-branc
|
https://en.wikipedia.org/wiki/Sound%20amplification%20by%20stimulated%20emission%20of%20radiation
|
Sound amplification by stimulated emission of radiation (SASER) refers to a device that emits acoustic radiation. It focuses sound waves in a way that they can serve as accurate and high-speed carriers of information in many kinds of applications—similar to uses of laser light.
Acoustic radiation (sound waves) can be emitted by using the process of sound amplification based on stimulated emission of phonons. Sound (or lattice vibration) can be described by a phonon just as light can be considered as photons, and therefore one can state that SASER is the acoustic analogue of the laser.
In a SASER device, a source (e.g., an electric field as a pump) produces sound waves (lattice vibrations, phonons) that travel through an active medium. In this active medium, a stimulated emission of phonons leads to amplification of the sound waves, resulting in a sound beam coming out of the device. The sound wave beams emitted from such devices are highly coherent.
The first successful SASERs were developed in 2009.
Terminology
Instead of a feedback-built wave of electromagnetic radiation (i.e., a laser beam), a SASER delivers a sound wave. SASER may also be referred to as phonon laser, acoustic laser or sound laser.
Uses and applications
SASERs could have wide applications. Apart from facilitating the investigation of terahertz-frequency ultrasound, the SASER is also likely to find uses in optoelectronics (electronic devices that detect and control light—as a method of transmitting a signal from an end to the other of, for instance, fiber optics), as a method of signal modulation and/or transmission.
Such devices could be high precision measurement instruments and they could lead to high energy focused sound.
Using SASERs to manipulate electrons inside semiconductors could theoretically result in terahertz-frequency computer processors, much faster than the current chips.
History
This concept can be more conceivable by imagining it in analogy to laser theory. Theodore Maim
|
https://en.wikipedia.org/wiki/Bottle-shock
|
Bottle-shock or Bottle-sickness is a temporary condition of wine characterized by muted or disjointed fruit flavors. It often occurs immediately after bottling or when wines (usually fragile wines) are given an additional dose of sulfur (in the form of sulfur dioxide or sulfite solution). After a few weeks, the condition usually disappears.
|
https://en.wikipedia.org/wiki/RTL1
|
RTL1 (retrotransposon like 1) is a retrotransposon derived protein coding gene. It is also known as PEG11 and is a paternally expressed imprinted gene, part of genomic imprinting. RTL1 plays an important role in the maintenance of fetal capillaries and is expressed in high quantities during late stage of fetal development. The expression of this gene is important for the development of the placenta, the fetus-maternal interface. Because the placenta is the first organ to form during the development of an embryo, problems in its establishment and biological role lead to complications during gestation. This organ maintains the fetus throughout the pregnancy and is therefore sensitive to disruptions. Studies in mice suggest that disruption of the RTL1 concentration, whether increasing or decreasing the amount of this protein coding gene, can lead to serious errors in the conservation of placental fetal capillaries. RTL1 knockout mice have shown obstruction in fetal development along with late fetal/neonatal death. Studies from sheep homologs suggest that high expression levels of RTL1 can lead to skeletal muscle hypertrophy This is due to over-expression patterns in the paternal allele specific gene.
|
https://en.wikipedia.org/wiki/Biogas
|
Biogas is a gaseous renewable energy source produced from raw materials such as agricultural waste, manure, municipal waste, plant material, sewage, green waste, wastewater, and food waste. Biogas is produced by anaerobic digestion with anaerobic organisms or methanogens inside an anaerobic digester, biodigester or a bioreactor.
The gas composition is primarily methane () and carbon dioxide () and may have small amounts of hydrogen sulfide (), moisture and siloxanes. The gases methane and hydrogen can be combusted or oxidized with oxygen. This energy release allows biogas to be used as a fuel; it can be used in fuel cells and for heating purpose, such as in cooking. It can also be used in a gas engine to convert the energy in the gas into electricity and heat.
After removal of carbon dioxide and hydrogen sulfide it can be compressed in the same way as natural gas and used to power motor vehicles. In the United Kingdom, for example, biogas is estimated to have the potential to replace around 17% of vehicle fuel. It qualifies for renewable energy subsidies in some parts of the world. Biogas can be cleaned and upgraded to natural gas standards, when it becomes bio-methane. Biogas is considered to be a renewable resource because its production-and-use cycle is continuous, and it generates no net carbon dioxide. From a carbon perspective, as much carbon dioxide is absorbed from the atmosphere in the growth of the primary bio-resource as is released, when the material is ultimately converted to energy.
Production
Biogas is produced by microorganisms, such as methanogens and sulfate-reducing bacteria, performing anaerobic respiration. Biogas can refer to gas produced naturally and industrially.
Natural
In soil, methane is produced in anaerobic environments by methanogens, but is mostly consumed in aerobic zones by methanotrophs. Methane emissions result when the balance favors methanogens. Wetland soils are the main natural source of methane. Other sources include ocea
|
https://en.wikipedia.org/wiki/Evolution%20of%20cognition
|
The evolution of cognition is the process by which life on Earth has gone from organisms with little to no cognitive function to a greatly varying display of cognitive function that we see in organisms today. Animal cognition is largely studied by observing behavior, which makes studying extinct species difficult. The definition of cognition varies by discipline; psychologists tend define cognition by human behaviors, while ethologists have widely varying definitions. Ethological definitions of cognition range from only considering cognition in animals to be behaviors exhibited in humans, while others consider anything action involving a nervous system to be cognitive.
Methods of study
Studying the evolution of cognition is accomplished through a comparative cognitive approach where a cognitive ability and comparing it between closely related species and distantly related species. For example, a researcher may want to analyze the connection between spatial memory and food caching behavior. By examining two closely related animals (chickadees and jays) and/or two distantly related animals (jays and chipmunks), hypotheses could be generated about when and how this cognitive ability evolved. Another way cognition has been studied in animals, specifically insects, is through a cognitive test battery. This method measures "intelligence directly with a battery of cognitive tests rather than relying on proxies like relative brain size."
Animals with high levels of cognition
Higher cognitive processes have evolved in many closely and distantly related animals. Some of these examples are considered convergent evolution, while others most likely shared a common ancestor that possessed higher cognitive function. For example, apes humans, and cetaceans most likely had a common ancestor with high levels of cognition, and as these species diverged they all possessed this trait. Corvids (the crow family) and apes show similar cognitive abilities in some areas such as tool us
|
https://en.wikipedia.org/wiki/PowerPC%205000
|
The PowerPC 5000 family is a series of PowerPC and Power ISA microprocessors from Freescale (previously Motorola) and STMicroelectronics designed for automotive and industrial microcontroller and system on a chip (SoC) use. The MPC5000 family consists of two lines (51xx/52xx and 55xx/56xx) that really don't share a common heritage.
Processors
MPC51xx
The MGT5100 was introduced in 2002 and Motorola's first CPU for its mobileGT SoC-platform for telematic, information and entertainment applications in cars. Based on the e300 core that stems from the PowerPC 603e, it ran in speeds up to 230 MHz and includes a double precision FPU, 16/16 kB L1 data/instruction caches and a rich set of I/O peripherals like DDR SDRAM, USB, PCI, Ethernet, IrDA and ATA disk controllers.
The MPC5121e was introduced in May 2007 and is based on the MPC5200B. It is a 400 MHz highly integrated SoC processor targeted for telematics applications and includes controllers for USB, PCI, networking, DDR RAM and disk storage. It also has an on-die PowerVR MBX Lite GPU supporting 3D acceleration and displays up to 1280×720 pixels and a fully programmable 200 MHz RISC co-processor designed for multimedia processing like real-time audio and speech recognition.
The MPC5123 was introduced in April 2008 and is essentially a MPC5121e without the PowerVR coprocessor. It's designed for telematics, point of sales systems, health care equipment, display kiosks and industrial automation.
MPC52xx
The MPC5200 family is based on the e300 core MGT5100 processor and is also a part of Freescale's mobileGT platform.
MPC5200 – 266–400 MHz, on-chip controllers for DDR-RAM, PCI, Ethernet, USB, ATA, serial, DMA and other I/O. Introduced in 2003, replaced by the MPC5200B.
MPC5200B – 266-466 MHz, enhanced MPC5200, introduced in 2005. Also used in the small EFIKA computer.
MPC55xx
Based on the e200 core that stems from the MPC5xx core, it is upwards-compatible with the newer e500 core and the older PowerPC Book E spec
|
https://en.wikipedia.org/wiki/Merozoite%20surface%20protein
|
Merozoite surface proteins are both integral and peripheral membrane proteins found on the surface of a merozoite, an early life cycle stage of a protozoan. Merozoite surface proteins, or MSPs, are important in understanding malaria, a disease caused by protozoans of the genus Plasmodium. During the asexual blood stage of its life cycle, the malaria parasite enters red blood cells to replicate itself, causing the classic symptoms of malaria. These surface protein complexes are involved in many interactions of the parasite with red blood cells and are therefore an important topic of study for scientists aiming to combat malaria.
Forms
The most common form of MSPs are anchored to the merozoite surface with glycophosphatidylinositol, a short glycolipid often used for protein anchoring. Additional forms include integral membrane proteins and peripherally associated proteins, which are found to a lesser extent than glycophosphatidylinositol anchored proteins, or (GPI)-anchored proteins, on the merozoite surface. Merozoite surface proteins 1 and 2 (MSP-1 & MSP-2) are the most abundant (GPI)-anchored proteins on the surface of Plasmodium merozoites.
Function
MSP-1 is synthesized at the very beginning of schizogony, or asexual merozoite reproduction. The merozoite first attaches to a red blood cell using its MSP-1 complex. The MSP-1 complex targets spectrin, a complex on the internal surface of the cell membrane of a red blood cell. The majority of the MSP-1 complex is shed upon entry into the red blood cell, but a small portion of the C-terminus, called MSP-119, is conserved. The exact role of MSP-119 remains unknown, but it currently serves as a marker for the formation of the food vacuole.
The function of the MSP-2 complex is not concrete, but current research suggests it has a role in red blood cell invasion due to its degradation shortly after invasion. MSP- 3, 6, 7 and 9 are peripheral membrane proteins that have been shown to form a complex with MSP-1, but the
|
https://en.wikipedia.org/wiki/D%C3%A9vissage
|
In algebraic geometry, dévissage is a technique introduced by Alexander Grothendieck for proving statements about coherent sheaves on noetherian schemes. Dévissage is an adaptation of a certain kind of noetherian induction. It has many applications, including the proof of generic flatness and the proof that higher direct images of coherent sheaves under proper morphisms are coherent.
Laurent Gruson and Michel Raynaud extended this concept to the relative situation, that is, to the situation where the scheme under consideration is not necessarily noetherian, but instead admits a finitely presented morphism to another scheme. They did this by defining an object called a relative dévissage which is well-suited to certain kinds of inductive arguments. They used this technique to give a new criterion for a module to be flat. As a consequence, they were able to simplify and generalize the results of EGA IV 11 on descent of flatness.
The word dévissage is French for unscrewing.
Grothendieck's dévissage theorem
Let X be a noetherian scheme. Let C be a subset of the objects of the category of coherent OX-modules which contains the zero sheaf and which has the property that, for any short exact sequence of coherent sheaves, if two of A, A′, and A′′ are in C, then so is the third. Let X′ be a closed subspace of the underlying topological space of X. Suppose that for every irreducible closed subset Y of X′, there exists a coherent sheaf G in C whose fiber at the generic point y of Y is a one-dimensional vector space over the residue field k(y). Then every coherent OX-module whose support is contained in X′ is contained in C.
In the particular case that , the theorem says that C is the category of coherent OX-modules. This is the setting in which the theorem is most often applied, but the statement above makes it possible to prove the theorem by noetherian induction.
A variation on the theorem is that if every direct factor of an object in C is again in C, then the condi
|
https://en.wikipedia.org/wiki/Flora%20Malesiana
|
Flora Malesiana is a multi-volume flora describing the vascular plants of Malesia (the biogeographical region consisting of Indonesia, Malaysia, Singapore, Brunei, the Philippines, and Papua New Guinea), published by the National Herbarium of the Netherlands since 1950. It currently consists of 204 full treatments, covering about 20% of a total of approximately 40,000 species.
Main series
Flora Malesiana is divided into two main series: I. Seed plants and II. Pteridophytes. Later volumes include CD-ROMs with additional multimedia contents such as interactive keys.
Series I. Seed Plants
Currently, the following volumes have been published in Series I. Seed Plants:
Volume 1 – Malesian Plant Collectors
Volume 2 & 3 – not published.
Volume 4 (1954) – Revisions: Aceraceae, Actinidiaceae sens.str., Aizoaceae, Amaranthaceae, Ancistrocladaceae, Aponogetonaceae, Bixaceae sens.str., Burmanniaceae, Callitrichaceae, Cannabinaceae, Caprifoliaceae, Ceratophyllaceae, Chenopodiaceae, Cochlospermaceae, Combretaceae, Convolvulaceae, Corynocarpaae, Crassulaceae, Datiscaceae, Dilleniaceae, Dioscoreaceae, Dipsacaceae, Droseraceae, Elatinaceae, Ficoidaceae see Aizoaceae, Flagellariaceae, Gnetaceae, Gonystylaceae, Hydrocaryaceae, Hydrophyllaceae, Juncaceae, Juncaginaceae, Martyniaceae see Pedaliaceae, Molluginaceae see Aizoaceae, Moringaceae, Myoporaceae, Myricaceae, Nyssaceae, Pedaliaceae, Pentaphragmataceae, Philydraceae, Phytolaccaceae, Plumbaginaceae, Podostemaceae, Polemoniaceae, Pontederiaceae, Punicaceae, Salvadoraceae, Sarcospermaceae, Saururaceae, Sonneratiaceae, Sparganiaceae, Sphenocleaceae, Stackhousiaceae, Stylidiaceae, Styracaceae, Thymelaeaceae–Gonystyloideae, Trapaceae see Hydrocaryaceae, Trigoniaceae, Tumeraceae, Typhaceae, Umbelliferae, Valerianaceae, Xyridaceae, Zygophyllaceae.
Volume 5 (1958) – Revisions: Alismataceae, Basellaceae, Batidaceae, Betulaceae, Burseraceae, Butomaceae, Centrolepidaceae, Connaraceae, Dichapetalaceae, Erythroxylaceae, Flacourtiaceae, Goodeni
|
https://en.wikipedia.org/wiki/CHB%20HEX%20N-terminal%20domain
|
In molecular biology, the CHB HEX N-terminal domain represents the N-terminal domain in chitobiases and beta-hexosaminidases. Chitobiases degrade chitin, which forms the exoskeleton in insects and crustaceans, and which is one of the most abundant polysaccharides on earth. Beta-hexosaminidases are composed of either a HexA/HexB heterodimer or a HexB homodimer, and can hydrolyse diverse substrates, including GM(2)-gangliosides; mutations in this enzyme are associated with Tay–Sachs disease. HexB is structurally similar to chitobiase, consisting of a beta sandwich structure; this structure is similar to that found in the cellulose-binding domain of cellulase from Cellulomonas fimi. This domain may function as a carbohydrate binding module.
|
https://en.wikipedia.org/wiki/Ambient%20space%20%28mathematics%29
|
In mathematics, especially in geometry and topology, an ambient space is the space surrounding a mathematical object along with the object itself. For example, a 1-dimensional line may be studied in isolation —in which case the ambient space of is , or it may be studied as an object embedded in 2-dimensional Euclidean space —in which case the ambient space of is , or as an object embedded in 2-dimensional hyperbolic space —in which case the ambient space of is . To see why this makes a difference, consider the statement "Parallel lines never intersect." This is true if the ambient space is , but false if the ambient space is , because the geometric properties of are different from the geometric properties of . All spaces are subsets of their ambient space.
See also
Configuration space
Geometric space
Manifold and ambient manifold
Submanifolds and Hypersurfaces
Riemannian manifolds
Ricci curvature
Differential form
|
https://en.wikipedia.org/wiki/Code%20reviewing%20software
|
Code reviewing software is computer software that helps humans find flaws in program source code.
It can be divided into two categories:
Automated code review software checks source code against a predefined set of rules and produces reports.
Different types of browsers visualise software structure and help humans better understand its structure. Such systems are geared more to analysis because they typically do not contain a predefined set of rules to check software against.
Manual code review tools allow people to collaboratively inspect and discuss changes, storing the history of the process for future reference.
See also
DeepCode (2016), cloud-based, AI-powered code review platform
|
https://en.wikipedia.org/wiki/Internetowy%20System%20Akt%C3%B3w%20Prawnych
|
The Internetowy System Aktów Prawnych ( in Polish), shortly ISAP, is a database with information about the legislation in force in Poland, which is part of the oldest and one of the most famous Polish legal information systems, and is publicly available on the website of the Sejm of the Republic of Poland.
|
https://en.wikipedia.org/wiki/Norton%20SystemWorks
|
Norton SystemWorks is a discontinued utility software suite by Symantec Corp. It integrates three of Symantec's most popular products – Norton Utilities, Norton CrashGuard and Norton AntiVirus – into one program designed to simplify solving common PC issues. Backup software was added later to high-end editions. SystemWorks was innovative in that it combined several applications into an all-in-one software for managing computer health, thus saving significant costs and time often spent on using different unrelated programs. SystemWorks, which was introduced in 1998 has since inspired a host of competitors such as iolo System Mechanic, McAfee Nuts And Bolts, Badosoft First Aid and many others.
Norton SystemWorks for Windows was initially offered alongside Norton Utilities until it replaced it as Symantec's flagship (and only) utility software in 2003. SystemWorks was discontinued in 2009, allowing Norton Utilities to return as Symantec's main utility suite. The Mac edition, lasting only three versions, was discontinued in 2004 to allow Symantec to concentrate its efforts solely on Internet security products for the Mac.
Norton NT Tools
The precursor of Norton SystemWorks was released in March 1996 for PCs running Windows NT 3.51 or later.
It includes Norton AntiVirus Scanner, Norton File Manager (based on Norton Navigator), UNC browser, Norton Fast Find, Norton Zip/Unzip, Norton Folder Synchronization, Folder Compare, Norton System Doctor, System Information, Norton Control Center.
Norton Protected Desktop Solution
An application suite built similar to Norton SystemWorks but includes different set of tools to enable support of DOS, Windows 3.1, Windows 95, or Windows NT. Released in July 1998,
it includes Norton Software Distribution Utility 2.0, Norton CrashGuard 2.0 for Windows NT, Norton CrashGuard 3.0 for Windows 95, Norton Speed Disk for Windows 95/NT, Norton Disk Doctor for Windows 95/NT, Norton AntiVirus 4.0 for DOS/Windows 3.1, and Norton AntiVirus 4.0 fo
|
https://en.wikipedia.org/wiki/MeCard%20%28QR%20code%29
|
MeCard is a data file similar to vCard but used by NTT DoCoMo in Japan in QR code format for use with Cellular Phones.
It is largely compatible with most QR-readers for smartphones. It is an easy way to share a contact with the most used fields. Usually, devices can recognize it and treat it like a contact ready to import.
The following QR Code image is an example containing the text: MECARD:N:Doe,John;TEL:13035551212;EMAIL:john.doe@example.com;;
Advantages
Its main advantage is the simplicity: It is very intuitive.
It is based in UTF-8 (which is ASCII compatible), the fields are separated with one semicolon (";"), the tags are very readable, they are separated with a colon (":").Perhaps the most important reason is that as compared to vCard, it needs very few chars which is important for the size of a QR Code.
Limitations
Compared to vCard, MeCard format only stores one single contact, a few labels, and a few data pieces to be set in a typical phonebook.
Structure
MeCard format starts with the tag "MECARD:" and it finishes with two semicolons (";;")
The supported tags include:
External links
QR Code MeCard online generator
MECARD QR code generator
MeCard offline generator
Computer file formats
Automatic identification and data capture
Barcodes
|
https://en.wikipedia.org/wiki/Bundibugyo%20ebolavirus
|
The species Bundibugyo ebolavirus ( ) is the taxonomic home of one virus, Bundibugyo virus (BDBV), that forms filamentous virions and is closely related to the infamous Ebola virus (EBOV). The virus causes severe disease in humans in the form of viral hemorrhagic fever and is a Select agent, World Health Organization Risk Group 4 Pathogen (requiring Biosafety Level 4-equivalent containment), National Institutes of Health/National Institute of Allergy and Infectious Diseases Category A Priority Pathogen, Centers for Disease Control and Prevention Category A Bioterrorism Agent, and is listed as a Biological Agent for Export Control by the Australia Group.
Use of term
The species Bundibugyo ebolavirus is a virological taxon (i.e. a man-made concept) that was suggested in 2008 to be included in the genus Ebolavirus, family Filoviridae, order Mononegavirales. The species has a single virus member, Bundibugyo virus (BDBV). The members of the species are called Bundibugyo ebolaviruses. The name Bundibugyo ebolavirus is derived from Bundibugyo (the name of the chief town of the Ugandan Bundibugyo District, where Bundibugyo virus was first discovered) and the taxonomic suffix ebolavirus (which denotes an ebolavirus species).
Bundibugyo virus (abbreviated BDBV) was first described in 2008 as a single member of a suggested new species Bundibugyo ebolavirus, which was suggested to be included into the genus Ebolavirus, family Filoviridae, order Mononegavirales.
According to the rules for taxon naming established by the International Committee on Taxonomy of Viruses (ICTV), the name Bundibugyo ebolavirus is always to be capitalized, italicized, never abbreviated, and to be preceded by the word "species". The names of its members (Bundibugyo ebolaviruses) are to be capitalized, are not italicized, and used without articles. A formal proposal to accept this species into virus taxonomy was submitted in 2010 and was accepted by the ICTV in 2011.
Species inclusion criteria
A v
|
https://en.wikipedia.org/wiki/Sialidase-3
|
Sialidase-3 is an enzyme that in humans is encoded by the NEU3 gene.
Function
This gene product belongs to a family of glycohydrolytic enzymes which remove sialic acid residues from glycoproteins and glycolipids. It is localized in the plasma membrane, and its activity is specific for gangliosides. It may play a role in modulating the ganglioside content of the lipid bilayer.
Interactions
Sialidase-3 has been shown to interact with Grb2.
|
https://en.wikipedia.org/wiki/P-compact%20group
|
In mathematics, in particular algebraic topology, a p-compact group is a homotopical version of a compact Lie group, but with all the local structure concentrated at a single prime p. This concept was introduced in , making precise earlier notions of a mod p finite loop space. A p-compact group has many Lie-like properties like maximal tori and Weyl groups, which are defined purely homotopically in terms of the classifying space, but with the important difference that the Weyl group, rather than being a finite reflection group over the integers, is now a finite p-adic reflection group. They admit a classification in terms of root data, which mirrors the classification of compact Lie groups, but with the integers replaced by the p-adic integers.
Definition
A p-compact group is a pointed space BG, with is local with respect to mod p homology, and such the pointed loop space G = ΩBG has finite mod p homology. One sometimes also refer to the p-compact group by G, but then one needs to keep in mind that the loop space structure is part of the data (which then allows one to recover BG).
A p-compact group is said to be connected if G is a connected space (in general the group of components of G will be a finite p-group). The rank of a p-compact group is the rank of its maximal torus.
Examples
The p-completion, in the sense of homotopy theory, of (the classifying space of) a compact connected Lie group defines a connected p-compact group. (The Weyl group is just its ordinary Weyl group, now viewed as a p-adic reflection group by tensoring the coweight lattice by .)
More generally the p-completion of a connected finite loop space defines a p-compact group. (Here the Weyl will be a -reflection group that may not come from a -reflection group.)
A rank 1 connected 2-compact group is either the 2-completion of SU(2) or SO(3). A rank 1 connected p-compact group, for p odd, is a "Sullivan sphere", i.e., the p-completion of a 2n-1-sphere S2n-1, where n divides p − 1.
|
https://en.wikipedia.org/wiki/Recrystallization%20%28metallurgy%29
|
In materials science, recrystallization is a process by which deformed grains are replaced by a new set of defect-free grains that nucleate and grow until the original grains have been entirely consumed. Recrystallization is usually accompanied by a reduction in the strength and hardness of a material and a simultaneous increase in the ductility. Thus, the process may be introduced as a deliberate step in metals processing or may be an undesirable byproduct of another processing step. The most important industrial uses are softening of metals previously hardened or rendered brittle by cold work, and control of the grain structure in the final product. Recrystallization temperature is typically 0.3–0.4 times the melting point for pure metals and 0.5 times for alloys.
Definition
Recrystallization is defined as the process in which grains of a crystal structure come in a new structure or new crystal shape.
A precise definition of recrystallization is difficult to state as the process is strongly related to several other processes, most notably recovery and grain growth. In some cases it is difficult to precisely define the point at which one process begins and another ends. Doherty et al. (1997) defined recrystallization as:
"... the formation of a new grain structure in a deformed material by the formation and migration of high angle grain boundaries driven by the stored energy of deformation. High angle boundaries are those with greater than a 10-15° misorientation"
Thus the process can be differentiated from recovery (where high angle grain boundaries do not migrate) and grain growth (where the driving force is only due to the reduction in boundary area).
Recrystallization may occur during or after deformation (during cooling or subsequent heat treatment, for example). The former is termed dynamic while the latter is termed static. In addition, recrystallization may occur in a discontinuous manner, where distinct new grains form and grow, or a continuous manner,
|
https://en.wikipedia.org/wiki/Sample-rate%20conversion
|
Sample-rate conversion, sampling-frequency conversion or resampling is the process of changing the sampling rate or sampling frequency of a discrete signal to obtain a new discrete representation of the underlying continuous signal. Application areas include image scaling and audio/visual systems, where different sampling rates may be used for engineering, economic, or historical reasons.
For example, Compact Disc Digital Audio and Digital Audio Tape systems use different sampling rates, and American television, European television, and movies all use different frame rates. Sample-rate conversion prevents changes in speed and pitch that would otherwise occur when transferring recorded material between such systems.
More specific types of resampling include: upsampling or upscaling; downsampling, downscaling, or decimation; and interpolation.
The term multi-rate digital signal processing is sometimes used to refer to systems that incorporate sample-rate conversion.
Techniques
Conceptual approaches to sample-rate conversion include: converting to an analog continuous signal, then re-sampling at the new rate, or calculating the values of the new samples directly from the old samples. The latter approach is more satisfactory since it introduces less noise and distortion. Two possible implementation methods are as follows:
If the ratio of the two sample rates is (or can be approximated by) a fixed rational number L/M: generate an intermediate signal by inserting L − 1 zeros between each of the original samples. Low-pass filter this signal at half of the lower of the two rates. Select every M-th sample from the filtered output, to obtain the result.
Treat the samples as geometric points and create any needed new points by interpolation. Choosing an interpolation method is a trade-off between implementation complexity and conversion quality (according to application requirements). Commonly used are: ZOH (for film/video frames), cubic (for image processing) and w
|
https://en.wikipedia.org/wiki/General%20linear%20group
|
In mathematics, the general linear group of degree n is the set of invertible matrices, together with the operation of ordinary matrix multiplication. This forms a group, because the product of two invertible matrices is again invertible, and the inverse of an invertible matrix is invertible, with the identity matrix as the identity element of the group. The group is so named because the columns (and also the rows) of an invertible matrix are linearly independent, hence the vectors/points they define are in general linear position, and matrices in the general linear group take points in general linear position to points in general linear position.
To be more precise, it is necessary to specify what kind of objects may appear in the entries of the matrix. For example, the general linear group over R (the set of real numbers) is the group of invertible matrices of real numbers, and is denoted by GLn(R) or .
More generally, the general linear group of degree n over any field F (such as the complex numbers), or a ring R (such as the ring of integers), is the set of invertible matrices with entries from F (or R), again with matrix multiplication as the group operation. Typical notation is GLn(F) or , or simply GL(n) if the field is understood.
More generally still, the general linear group of a vector space GL(V) is the automorphism group, not necessarily written as matrices.
The special linear group, written or SLn(F), is the subgroup of consisting of matrices with a determinant of 1.
The group and its subgroups are often called linear groups or matrix groups (the automorphism group GL(V) is a linear group but not a matrix group). These groups are important in the theory of group representations, and also arise in the study of spatial symmetries and symmetries of vector spaces in general, as well as the study of polynomials. The modular group may be realised as a quotient of the special linear group .
If , then the group is not abelian.
General linear grou
|
https://en.wikipedia.org/wiki/Gimesia
|
Gimesia is a genus of bacteria from the family of Planctomycetaceae with nine known species. Gimesia maris has been isolated from neritic water from Puget Sound in the United States.
Phylogeny
The currently accepted taxonomy is based on the List of Prokaryotic names with Standing in Nomenclature (LPSN) and National Center for Biotechnology Information (NCBI)
See also
List of bacterial orders
List of bacteria genera
|
https://en.wikipedia.org/wiki/Host%20Europe%20Group
|
Host Europe Group (formerly Pipex Communications plc and GX Networks) was an American-owned, European-located website hosting, email and domain name registrar company headquartered Hayes, West London. Founded as GX Networks in 1997, the company was renamed Pipex Communications plc following its takeover of Pipex in 2003. It reverted to the GX Networks name following its sale of Pipex in 2008 before being renamed Host Europe Group in 2009. It was acquired by American hosting company GoDaddy in 2017, and its name was in the process of being phased out.
Brands
Through a series of acquisitions and (de)mergers GX Networks (and subsequently Webfusion) is known through various brands. Since 2009, the company has consolidated its trading under the brand names: 123-reg (The UK's largest domain name registrar, with more than 3 million names registered and 1.3 million websites hosted), Heart Internet (UK hosting), Tsohost (UK hosting), Host Europe (German hosting), Webfusion (Spanish hosting), RedCoruna (Spanish hosting), Mesh Digital and Domainbox (international domain names).
History
Host Europe was founded by Cologne-based entrepreneur Uwe Braun. It began by offering internet services to corporations and began trading under the GX name in 1997. It believed that it had developed the first transatlantic IP backbone running native ATM. Webfusion originally started out with major Network Access Points in Washington and San Jose in the US, London's LINX and Stockholm in Europe.
With various changes of ownership, the company's name has changed several times, taking on the Pipex name following its takeover in 2003. Following restructuring in 2009, the company trades under the Webfusion name in the UK, as part of HEG (formerly Host Europe Group) and is based in Hayes in West London. As of 2015, HEG claimed to be Europe's largest privately-owned hosting company.
Timeline
April 1997 - Internet Technology Group (ITG) announces the acquisition of Xara Networks Limited in a deal w
|
https://en.wikipedia.org/wiki/The%20Einstein%20Theory%20of%20Relativity
|
The Einstein Theory of Relativity (1923) is a silent animated short film directed by Dave Fleischer and released by Fleischer Studios.
History
In August 1922, Scientific American published an article explaining their position that a silent film would be unsuccessful in presenting the theory of relativity to the general public, arguing that only as part of a broader educational package including lecture and text would such film be successful. Scientific American then went on to review frames from an unnamed German film reported to be financially successful.
Six months later, on February 8, 1923, the Fleischers released their relativity film, produced in collaboration with popular science journalist Garrett P. Serviss to accompany his book on the same topic. Two versions of the Fleischer film are reported to exist – a shorter two-reel (20 minute) edit intended for general theater audiences, and a longer five-reel (50 minute) version intended for educational use.
The Fleischers lifted footage from the German predecessor, Die Grundlagen der Einsteinschen Relativitäts-Theorie, directed by Hanns-Walter Kornblum, for inclusion into their film. Presented here are images from the Fleischer film and German film. If actual footage was not recycled into The Einstein Theory of Relativity, these images and text from the Scientific American article suggest that original visual elements from the German film were.
This film, like much of the Fleischer's work, has fallen into the public domain. Unlike Fleischer Studio's Superman or Betty Boop cartoons, The Einstein Theory of Relativity has very few existing prints and is available in 16mm from only a few specialized film preservation organizations.
|
https://en.wikipedia.org/wiki/Rhodoferax
|
Rhodoferax is a genus of Betaproteobacteria belonging to the purple nonsulfur bacteria. Originally, Rhodoferax species were included in the genus Rhodocyclus as the Rhodocyclus gelatinous-like group. The genus Rhodoferax was first proposed in 1991 to accommodate the taxonomic and phylogenetic discrepancies arising from its inclusion in the genus Rhodocyclus. Rhodoferax currently comprises four described species: R. fermentans, R. antarcticus, R. ferrireducens, and R. saidenbachensis. R. ferrireducens, lacks the typical phototrophic character common to two other Rhodoferax species. This difference has led researchers to propose the creation of a new genus, Albidoferax, to accommodate this divergent species. The genus name was later corrected to Albidiferax. Based on geno- and phenotypical characteristics, A. ferrireducens was reclassified in the genus Rhodoferax in 2014. R. saidenbachensis, a second non-phototrophic species of the genus Rhodoferax was described by Kaden et al. in 2014.
Taxonomy
Rhodoferax species are Gram-negative rods, ranging in diameter from 0.5 to 0.9 µm with a single polar flagellum. The first two species described for the genus, R. fermentans and R. antarcticus, are facultative photoheterotrophs that can grow anaerobically when exposed to light and aerobically under dark conditions at atmospheric levels of oxygen. R. ferrireducens is a nonphototrophic facultative anaerobe capable of reducing Fe(III) at temperatures as low as 4 °C. R. saidenbachensis grows strictly aerobic and has a very low rate of cell division. All Rhodoferax species possess ubiquinone and rhodoquinone derivatives with eight unit isoprenoid side chains. Dominant fatty acids in Rhodoferax cells are palmitoleic acid (16:1) and palmitic acid (16:0), as well as 3-OH octanoic acid (8:0). Major carotenoids found in the phototrophic species are spheroidene, OH-spheroidene, and spirilloxanthin.
Genomes
As of 2014, three genomes have been sequenced from the genus Rhodoferax. Seq
|
https://en.wikipedia.org/wiki/Albularyo
|
Albularyo or albulario is a Filipino term for a witch doctor, folk healer or medicine man, derived from Spanish herbolario (herbalist). They practice folk medicine and use medicinal plants in their trade.
Overview
the Role and functions
An albularyo is a "folk doctor" commonly found in the more rural areas of the Philippines who heals people using herbs and traditional practices such as hilot or massage. Their services are considered either as a first or as a last resort for addressing illnesses. The albularyo's patient claims that the practitioner have supernatural powers that modern medicine does not provide. This belief makes them more trustworthy than modern medicine practitioners. Aside from practicing folk medicine, the albularyo is also alleged to practice black magic and curse people.
The albularyos practice their trade using prayers called orasyon (from Spanish oracion) and rituals. They also use concoctions made from plant parts such as leaves, bark, roots and oils such as coconut oils. Pangalap is the process of searching for these medicinal plants and pabukal is the preparation of decoctions from said plants. Albularyos also use their own saliva and pieces of papers with writings. The albularyo use tawas (alum) crystals to find out who is causing the ailments in their patients." The may also use candle wax poured in water, eggs, or spirits to divine the cause of the ailments. Some ailments are claimed to be the work of lamang lupa who were unknowingly or knowingly harmed by the patient. The albularyo may then use rituals and prayers to drive away the spirit and therefore remove the sickness from the patient.
See also
Hilot, traditional Filipino medicine that uses massage
Kulam, or Filipino witchcraft
Pagtatawas, or Filipino ritual for the diagnosis of illnesses
Folk medicine
|
https://en.wikipedia.org/wiki/List%20of%20small%20groups
|
The following list in mathematics contains the finite groups of small order up to group isomorphism.
Counts
For n = 1, 2, … the number of nonisomorphic groups of order n is
1, 1, 1, 2, 1, 2, 1, 5, 2, 2, 1, 5, 1, 2, 1, 14, 1, 5, 1, 5, ...
For labeled groups, see .
Glossary
Each group is named by Small Groups library as Goi, where o is the order of the group, and i is the index used to label the group within that order.
Common group names:
Zn: the cyclic group of order n (the notation Cn is also used; it is isomorphic to the additive group of Z/nZ)
Dihn: the dihedral group of order 2n (often the notation Dn or D2n is used)
K4: the Klein four-group of order 4, same as and Dih2
D2n: the dihedral group of order 2n, the same as Dihn (notation used in section List of small non-abelian groups)
Sn: the symmetric group of degree n, containing the n! permutations of n elements
An: the alternating group of degree n, containing the even permutations of n elements, of order 1 for , and order n!/2 otherwise
Dicn or Q4n: the dicyclic group of order 4n
Q8: the quaternion group of order 8, also Dic2
The notations Zn and Dihn have the advantage that point groups in three dimensions Cn and Dn do not have the same notation. There are more isometry groups than these two, of the same abstract group type.
The notation denotes the direct product of the two groups; Gn denotes the direct product of a group with itself n times. G ⋊ H denotes a semidirect product where H acts on G; this may also depend on the choice of action of H on G.
Abelian and simple groups are noted. (For groups of order , the simple groups are precisely the cyclic groups Zn, for prime n.) The equality sign ("=") denotes isomorphism.
The identity element in the cycle graphs is represented by the black circle. The lowest order for which the cycle graph does not uniquely represent a group is order 16.
In the lists of subgroups, the trivial group and the group itself are not listed. Where there are s
|
https://en.wikipedia.org/wiki/Forced%20convection%20in%20porous%20media
|
Forced convection is type of heat transport in which fluid motion is generated by an external source like a (pump, fan, suction device, etc.). Heat transfer through porus media is very effective and efficiently. Forced convection heat transfer in a confined porous medium has been a subject of intensive studies during the last decades because of its wide applications.
The basic problem in heat convection through porous media consists of predicting the heat transfer rate between a deferentially heated, solid impermeable surface and a fluid-saturated porous medium. Beginning with constant wall temperature.
In 2D steady state system
According to Darcy's law
is the thickness of the slender layer of length x that affects the temperature transition from to .
Balancing the energy equation between enthalpy flow in the x direction and thermal diffusion in the y direction
boundary is slender so
The Peclet number is a dimensionless number used in calculations involving convective heat transfer. It is the ratio of the thermal energy convected to the fluid to the thermal energy conducted within the fluid.
Advective transport rate Diffusive transport rate
See also
Darcy's law
Nusselt Number
Porous media
Convective heat transfer
Heat transfer coefficient
Porous media
|
https://en.wikipedia.org/wiki/Pseudorandom%20graph
|
In graph theory, a graph is said to be a pseudorandom graph if it obeys certain properties that random graphs obey with high probability. There is no concrete definition of graph pseudorandomness, but there are many reasonable characterizations of pseudorandomness one can consider.
Pseudorandom properties were first formally considered by Andrew Thomason in 1987. He defined a condition called "jumbledness": a graph is said to be -jumbled for real and with if
for every subset of the vertex set , where is the number of edges among (equivalently, the number of edges in the subgraph induced by the vertex set ). It can be shown that the Erdős–Rényi random graph is almost surely -jumbled. However, graphs with less uniformly distributed edges, for example a graph on vertices consisting of an -vertex complete graph and completely independent vertices, are not -jumbled for any small , making jumbledness a reasonable quantifier for "random-like" properties of a graph's edge distribution.
Connection to local conditions
Thomason showed that the "jumbled" condition is implied by a simpler-to-check condition, only depending on the codegree of two vertices and not every subset of the vertex set of the graph. Letting be the number of common neighbors of two vertices and , Thomason showed that, given a graph on vertices with minimum degree , if for every and , then is -jumbled. This result shows how to check the jumbledness condition algorithmically in polynomial time in the number of vertices, and can be used to show pseudorandomness of specific graphs.
Chung–Graham–Wilson theorem
In the spirit of the conditions considered by Thomason and their alternately global and local nature, several weaker conditions were considered by Chung, Graham, and Wilson in 1989: a graph on vertices with edge density and some can satisfy each of these conditions if
Discrepancy: for any subsets of the vertex set , the number of edges between and is within of .
Discrepa
|
https://en.wikipedia.org/wiki/Mir-828%20microRNA%20precursor%20family
|
In molecular biology mir-828 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms.
See also
MicroRNA
|
https://en.wikipedia.org/wiki/List%20of%20knot%20theory%20topics
|
Knot theory is the study of mathematical knots. While inspired by knots which appear in daily life in shoelaces and rope, a mathematician's knot differs in that the ends are joined so that it cannot be undone. In precise mathematical language, a knot is an embedding of a circle in 3-dimensional Euclidean space, R3. Two mathematical knots are equivalent if one can be transformed into the other via a deformation of R3 upon itself (known as an ambient isotopy); these transformations correspond to manipulations of a knotted string that do not involve cutting the string or passing the string through itself.
History
Knots, links, braids
Knot (mathematics) gives a general introduction to the concept of a knot.
Two classes of knots: torus knots and pretzel knots
Cinquefoil knot also known as a (5, 2) torus knot.
Figure-eight knot (mathematics) the only 4-crossing knot
Granny knot (mathematics) and Square knot (mathematics) are a connected sum of two Trefoil knots
Perko pair, two entries in a knot table that were later shown to be identical.
Stevedore knot (mathematics), a prime knot with crossing number 6
Three-twist knot is the twist knot with three-half twists, also known as the 52 knot.
Trefoil knot A knot with crossing number 3
Unknot
Knot complement, a compact 3 manifold obtained by removing an open neighborhood of a proper embedding of a tame knot from the 3-sphere.
Knots and graphs general introduction to knots with mention of Reidemeister moves
Notation used in knot theory:
Conway notation
Dowker–Thistlethwaite notation (DT notation)
Gauss code (see also Gauss diagrams)
continued fraction regular form
General knot types
2-bridge knot
Alternating knot; a knot that can be represented by an alternating diagram (i.e. the crossing alternate over and under as one traverses the knot).
Berge knot a class of knots related to Lens space surgeries and defined in terms of their properties with respect to a genus 2 Heegaard surface.
Cable knot, see Sate
|
https://en.wikipedia.org/wiki/Locally%20connected%20space
|
In topology and other branches of mathematics, a topological space X is
locally connected if every point admits a neighbourhood basis consisting entirely of open, connected sets.
Background
Throughout the history of topology, connectedness and compactness have been two of the most
widely studied topological properties. Indeed, the study of these properties even among subsets of Euclidean space, and the recognition of their independence from the particular form of the Euclidean metric, played a large role in clarifying the notion of a topological property and thus a topological space. However, whereas the structure of compact subsets of Euclidean space was understood quite early on via the Heine–Borel theorem, connected subsets of (for n > 1) proved to be much more complicated. Indeed, while any compact Hausdorff space is locally compact, a connected space—and even a connected subset of the Euclidean plane—need not be locally connected (see below).
This led to a rich vein of research in the first half of the twentieth century, in which topologists studied the implications between increasingly subtle and complex variations on the notion of a locally connected space. As an example, the notion of weak local connectedness at a point and its relation to local connectedness will be considered later on in the article.
In the latter part of the twentieth century, research trends shifted to more intense study of spaces like manifolds, which are locally well understood (being locally homeomorphic to Euclidean space) but have complicated global behavior. By this it is meant that although the basic point-set topology of manifolds is relatively simple (as manifolds are essentially metrizable according to most definitions of the concept), their algebraic topology is far more complex. From this modern perspective, the stronger property of local path connectedness turns out to be more important: for instance, in order for a space to admit a universal cover it must be connect
|
https://en.wikipedia.org/wiki/Magnetic%20chicane
|
A magnetic chicane also called a bunch compressor helps form dense bunches of electrons in a free-electron laser. A magnetic chicane makes electrons detour slightly from their otherwise straight bath, and in that way is similar to a chicane on a road.
A magnetic chicane consists of four dipole magnets, giving electrons at the beginning of a bunch a longer path than electrons at the end of the bunch, thereby allowing the laging electrons to catch up.
Free-electron laser
A free-electron laser depends upon a beam of tightly bunched electrons. Short bunches of electrons are produced by a photoinjector, but they quickly grow, because electrons have negative charge and little mass, causing the bunch to expand. As the bunch is accelerated, the electrons gain mass and quickly approach the speed of light. After that, electrons at the end of the bunch cannot go any faster to catch up with electrons at the beginning of the bunch.
Chirp
This problem is solved by adjusting the phase of the driving electric field to more strongly add energy and mass to electrons at the trailing end of the bunch. This is called negative energy chirp, meaning the energy decreases along the direction of beam travel. Because the beam is traveling at almost the speed of light, the trailing electrons gain mass, rather than velocity. This results in a correlation between mass and position in the bunch.
Chicane
The chicane gives lagging electrons time to catch up. More massive electrons are deflected less by the magnetic field than lighter electrons, and therefor take a shorter path through the chicane, resulting in a shorter bunch. A chicane consists of four dipole magnets with the following roles:
Deflects the beam slightly away from the central axis of the accelerator, with lighter electrons deflected more than more massive electrons.
Deflects the beam in the opposite direction, making it parallel to the central axis, but with an offset. The offset is greatest for lighter electrons.
|
https://en.wikipedia.org/wiki/Secant%20variety
|
In algebraic geometry, the secant variety , or the variety of chords, of a projective variety is the Zariski closure of the union of all secant lines (chords) to V in :
(for , the line is the tangent line.) It is also the image under the projection of the closure Z of the incidence variety
.
Note that Z has dimension and so has dimension at most .
More generally, the secant variety is the Zariski closure of the union of the linear spaces spanned by collections of k+1 points on . It may be denoted by . The above secant variety is the first secant variety. Unless , it is always singular along , but may have other singular points.
If has dimension d, the dimension of is at most .
A useful tool for computing the dimension of a secant variety is Terracini's lemma.
Examples
A secant variety can be used to show the fact that a smooth projective curve can be embedded into the projective 3-space as follows. Let be a smooth curve. Since the dimension of the secant variety S to C has dimension at most 3, if , then there is a point p on that is not on S and so we have the projection from p to a hyperplane H, which gives the embedding . Now repeat.
If is a surface that does not lie in a hyperplane and if , then S is a Veronese surface.
|
https://en.wikipedia.org/wiki/Reflexive%20closure
|
In mathematics, the reflexive closure of a binary relation on a set is the smallest reflexive relation on that contains A relation is called if it relates every element of to itself.
For example, if is a set of distinct numbers and means " is less than ", then the reflexive closure of is the relation " is less than or equal
Definition
The reflexive closure of a relation on a set is given by
In plain English, the reflexive closure of is the union of with the identity relation on
Example
As an example, if
then the relation is already reflexive by itself, so it does not differ from its reflexive closure.
However, if any of the pairs in was absent, it would be inserted for the reflexive closure.
For example, if on the same set
then the reflexive closure is
See also
|
https://en.wikipedia.org/wiki/Clefamide
|
Clefamide (trade name Mebinol) is an antiprotozoal agent that was used to treat amoebiasis in the 1960s. There is no evidence for any later use of the drug.
|
https://en.wikipedia.org/wiki/Contagious%20disease
|
A contagious disease is an infectious disease that is readily spread (that is, communicated) by transmission of a pathogen through contact (direct or indirect) with an infected person.
A disease is often known to be contagious before medical science discovers its causative agent. Koch's postulates, which were published at the end of the 19th century, were the standard for the next 100 years or more, especially with diseases caused by bacteria. Microbial pathogenesis attempts to account for diseases caused by a virus.
The disease itself can also be called a contagion.
Historical meaning
Originally, the term referred to a contagion (a derivative of 'contact') or disease transmissible only by direct physical contact. In the modern-day, the term has sometimes been broadened to encompass any communicable or infectious disease. Often the word can only be understood in context, where it is used to emphasize very infectious, easily transmitted, or especially severe communicable diseases.
In 1849, John Snow first proposed that cholera was a contagious disease.
Effect on public health response
Most epidemics are caused by contagious diseases, with occasional exceptions, such as yellow fever. The spread of non-contagious communicable diseases is changed either very little or not at all by medical isolation of ill persons or medical quarantine for exposed persons. Thus, a "contagious disease" is sometimes defined in practical terms, as a disease for which isolation or quarantine are useful public health responses.
Some locations are better suited for the research into the contagious pathogens due to the reduced risk of transmission afforded by a remote or isolated location.
Negative room pressure is a technique in health care facilities based on aerobiological designs.
See also
Germ theory of disease
Herd immunity
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.